CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-4836

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.28632/1

CVE-2024-4836 allows unauthenticated users to download configuration files from Edito CMS web services, potentially exposing sensitive data. Versions 3.5 through 3.25 are affected, and the vulnerability was patched in releases dating back to January 10, 2014. Although the CVSS score is 0, the presence of active exploits and "In The Wild" tags highlight the risk. With a SOCRadar Vulnerability Risk Score (SVRS) of 30, while not critical, this CVE warrants attention, especially given the availability of exploits. Successful exploitation can lead to information disclosure, potentially compromising the entire system. Businesses using older Edito CMS versions should verify that the patch has been applied. The ability to access configuration files without authentication is a significant security flaw, making systems vulnerable to further attacks.

In The Wild
Exploit Avaliable
2024-07-02

2024-07-02
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-4836 is a vulnerability in Edito CMS versions 3.5 through 3.25 that allows unauthenticated users to download sensitive configuration files. This could lead to the disclosure of sensitive information, such as database credentials, user passwords, and other sensitive data. The vulnerability was patched in releases dated January 10, 2014, and higher versions were never affected.

Key Insights

  • The SVRS for CVE-2024-4836 is 38, indicating a moderate level of severity.
  • The vulnerability is not actively exploited in the wild.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning about the vulnerability.

Mitigation Strategies

  • Update Edito CMS to the latest version (3.26 or higher).
  • Restrict access to the Edito CMS configuration files to authorized users only.
  • Implement a web application firewall (WAF) to block unauthorized access to the Edito CMS configuration files.
  • Regularly monitor Edito CMS for any suspicious activity.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
sleep46/CVE-2024-4836_Checkhttps://github.com/sleep46/CVE-2024-4836_Check2024-07-02
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Vulnerability in Edito CMS software
CERT Polska2025-04-01
Vulnerability in Edito CMS software | Local file inclusion vulnerability (CVE-2024-4836) has been found in Edito CMS software.
cert.pl
rss
forum
news
CVE-2024-4836 | Edito CMS up to 3.25 Configuration File file access
vuldb.com2024-07-02
CVE-2024-4836 | Edito CMS up to 3.25 Configuration File file access | A vulnerability was found in Edito CMS up to 3.25. It has been rated as problematic. This issue affects some unknown processing of the component Configuration File Handler. The manipulation leads to files or directories accessible. The identification of this vulnerability is CVE-2024-4836. The attack may be initiated remotely. There
cve-2024-4836
domains
urls
cves

Social Media

CVE-2024-4836 Web services managed by Edito CMS (Content Management System) in versions from 3.5 through 3.25 leak sensitive data as they allow downloading configuration files by an unauthenticated user. The issue... https://t.co/nSNd1tmc57
0
0
0
CVE-2024-4836 Web services managed by Edito CMS (Content Management System) in versions from 3.5 through 3.25 leak sensitive data as they allow downloading configuration files by an … https://t.co/2s4tBhyD1n
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://cert.pl/en/posts/2024/07/CVE-2024-4836
[email protected]https://cert.pl/posts/2024/07/CVE-2024-4836
[email protected]https://www.edito.pl/

CWE Details

CWE IDCWE NameDescription
CWE-552Files or Directories Accessible to External PartiesThe product makes files or directories accessible to unauthorized actors, even though they should not be.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence