CVE-2024-32640
Published: 11 August 2025
Summary
CVE-2024-32640 is a critical-severity SQL Injection (CWE-89) vulnerability in Projectdiscovery (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, ranked in the top 0.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection attacks like CVE-2024-32640 by enforcing validation of all inputs to the processAsyncObject method, blocking malicious SQL payloads.
Mandates timely identification, testing, and patching of flaws such as this SQL injection vulnerability, aligning with the vendor's fix in versions 7.4.5, 7.3.12, and 7.2.7.
Requires vulnerability scanning that identifies SQL injection flaws like CVE-2024-32640, enabling proactive remediation before remote code execution can occur.
NVD Description
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.5, 7.3.12, and…
more
7.2.7 contain a fix for the issue.
Deeper analysisAI
CVE-2024-32640 is a SQL injection vulnerability in the `processAsyncObject` method of MASA CMS, an open-source Enterprise Content Management platform. It affects versions prior to 7.4.5, 7.3.12, and 7.2.7, potentially allowing remote code execution. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89.
An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation grants high-impact remote code execution, enabling full compromise of the affected system including confidentiality, integrity, and availability violations.
Mitigation involves upgrading to MASA CMS versions 7.4.5, 7.3.12, or 7.2.7, which include fixes for the issue as detailed in GitHub commits such as 259fc6061d022d5025a3289a3f8de9852ad9c91d, 280489e2d6c8daf5022fdb0225235462dd9d4534, and 3d6319b8775bb6438bc822d845926990511f5075, along with the security advisory at GHSA-24rr-gwx3-jhqc.
Details
- CWE(s)