CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-50477

Critical Severity
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.30941/1

CVE-2024-50477 is a critical Authentication Bypass vulnerability found in Stacks Mobile App Builder, affecting versions up to 5.2.3. This flaw allows attackers to bypass authentication mechanisms through an alternate path or channel, potentially gaining unauthorized access. The SOCRadar Vulnerability Risk Score (SVRS) of 84 indicates that this is a critical vulnerability requiring immediate attention. Successful exploitation can lead to severe consequences, including data breaches, unauthorized modifications, and complete compromise of the affected mobile applications. Given that this vulnerability is tagged as "In The Wild", organizations using Stacks Mobile App Builder should prioritize patching or mitigation strategies to prevent potential attacks. This authentication bypass represents a significant risk due to the potential for widespread unauthorized access and control. The high CVSS score further emphasizes the severity of this security issue.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-10-28

2024-10-31
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-50477 is an Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Mobile App Builder. This vulnerability allows an attacker to bypass authentication and gain unauthorized access to the application. The CVSS score of 9.8 indicates the high severity of this vulnerability, while the SVRS of 30 suggests a moderate level of risk.

Key Insights

  • Active Exploitation: This vulnerability is actively exploited in the wild, indicating that attackers are aware of it and are actively using it to target systems.
  • High Impact: Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive data, disrupt application functionality, or even take control of the system.
  • Widely Affected: This vulnerability affects all versions of Stacks Mobile App Builder from n/a through 5.2.3, making a large number of systems potentially vulnerable.

Mitigation Strategies

  • Update Software: Install the latest security updates from the vendor as soon as possible.
  • Implement Strong Authentication: Use multi-factor authentication or other strong authentication mechanisms to prevent unauthorized access.
  • Monitor for Suspicious Activity: Regularly monitor logs and security alerts for any suspicious activity that may indicate an attack.
  • Educate Users: Train users on the importance of cybersecurity and how to identify and report suspicious activity.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

[CVE-2024-50477: CRITICAL] Vulnerability alert: Stacks Mobile App Builder (n/a-5.2.3) susceptible to Authentication Bypass via alternate path or channel. Update recommended for enhanced cyber security.#cybersecurity,#vulnerability https://t.co/lfwWF6Xv5e https://t.co/JWS6XOGdYs
0
0
0
CVE-2024-50477 Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This… https://t.co/4tks5Tr4iA
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://patchstack.com/database/vulnerability/stacks-mobile-app-builder/wordpress-stacks-mobile-app-builder-plugin-5-2-3-account-takeover-vulnerability?_s_id=cve

CWE Details

CWE IDCWE NameDescription
CWE-288Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306Missing Authentication for Critical FunctionThe software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence