Cyber Posture

CVE-2024-53678

High

Published: 25 March 2025

Published
25 March 2025
Modified
14 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53678 is a high-severity SQL Injection (CWE-89) vulnerability in Apache Vcl. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SQL injection vulnerability by requiring identification, reporting, and timely patching to Apache VCL version 2.5.2.

prevent

Enforces validation and error handling of user form data inputs to neutralize special elements and prevent modification of SQL SELECT statements.

detect

Requires vulnerability scanning that identifies SQL injection flaws like CWE-89 in web applications such as Apache VCL.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in a network-accessible web application (Apache VCL form handling) directly maps to exploitation of the application for initial access or impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache VCL. Users can modify form data submitted when requesting a new Block Allocation such that a SELECT SQL statement is modified. The data returned by…

more

the SELECT statement is not viewable by the attacker. This issue affects all versions of Apache VCL from 2.2 through 2.5.1. Users are recommended to upgrade to version 2.5.2, which fixes the issue.

Deeper analysisAI

CVE-2024-53678 is an SQL injection vulnerability (CWE-89) in Apache VCL, stemming from improper neutralization of special elements in SQL commands. It affects all versions from 2.2 through 2.5.1 and occurs when users modify form data submitted for requesting a new Block Allocation, allowing alteration of a SELECT SQL statement. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Authenticated users with low privileges (PR:L) can exploit this over the network with low complexity and no user interaction required. By injecting malicious payloads into the form data, attackers can modify the SELECT statement, potentially leading to high impacts on confidentiality, integrity, and availability, though the description notes that data returned by the modified query is not directly viewable by the attacker.

Apache recommends upgrading to version 2.5.2, which resolves the issue. Detailed advisories are available in the Apache mailing list announcement at https://lists.apache.org/thread/2bmjnzgjwwq59nv6xw44w0tnpz4k4pf4 and the oss-security mailing list at http://www.openwall.com/lists/oss-security/2025/03/24/1.

Details

CWE(s)

Affected Products

apache
vcl
2.2 — 2.5.2

CVEs Like This One

CVE-2025-24783Same vendor: Apache
CVE-2026-24343Same vendor: Apache
CVE-2024-52577Same vendor: Apache
CVE-2025-27636Same vendor: Apache
CVE-2026-40473Same vendor: Apache
CVE-2026-42779Same vendor: Apache
CVE-2025-59059Same vendor: Apache
CVE-2026-25747Same vendor: Apache
CVE-2026-41409Same vendor: Apache
CVE-2026-33454Same vendor: Apache

References