CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-42599

Medium Severity
Seacms
SVRS
30/100

CVSSv3
8.8/10

EPSS
0.00854/1

CVE-2024-42599 is a remote code execution vulnerability in SeaCMS 13.0, allowing attackers to execute arbitrary commands. This vulnerability stems from inadequate restrictions in admin_files.php, enabling authenticated attackers to bypass file edit limitations and inject malicious code. Despite a CVSS score of 8.8, SOCRadar's Vulnerability Risk Score (SVRS) indicates a score of 30, suggesting a lower immediate threat level compared to other vulnerabilities. However, the potential for system compromise remains a significant risk. Successful exploitation could grant attackers full system privileges. Organizations using SeaCMS 13.0 should investigate this CVE and apply relevant patches or mitigations as needed to prevent unauthorized access and control of their systems. Even with a lower SVRS, the possibility of escalation and potential for severe impact necessitates proactive security measures. The ability to execute arbitrary commands makes this a critical issue requiring attention.

No tags available
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-08-22

2025-03-28

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

CVE-2024-42599 SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attack… https://t.co/RKscKbNqEm
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppSeacmsseacms

References

ReferenceLink
[email protected]https://gitee.com/fushuling/cve/blob/master/CVE-2024-42599.md
[email protected]https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_files.php%20code%20injection.md
[email protected]https://gitee.com/fushuling/cve/blob/master/CVE-2024-42599.md
[email protected]https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_files.php%20code%20injection.md

CWE Details

CWE IDCWE NameDescription
CWE-94Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence