Cyber Posture

CVE-2024-54879

CriticalPublic PoC

Published: 06 January 2025

Published
06 January 2025
Modified
28 March 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0429 88.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-54879 is a critical-severity Improper Preservation of Permissions (CWE-281) vulnerability in Seacms Seacms. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 11.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly preventing the logic flaw that allows unauthorized recharging of member accounts.

prevent

Explicitly identifies and authorizes only specific actions performable without identification or authentication, blocking unauthenticated recharge exploitation.

prevent

Applies least privilege to restrict recharge capabilities to only necessary authorized users or roles, mitigating indefinite unauthorized recharges by any user.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

Direct unauthenticated network exploitation of public-facing SeaCMS web app logic flaw enables indefinite unauthorized account recharging/manipulation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely.

Deeper analysisAI

CVE-2024-54879 is an incorrect access control vulnerability (CWE-281) affecting SeaCMS version 13.1. The issue stems from a logic flaw that enables exploitation to allow any user to recharge members indefinitely. Published on January 6, 2025, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), reflecting critical severity due to high impacts on confidentiality and integrity.

Unauthenticated attackers (PR:N) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows indefinite recharging of member accounts, potentially enabling unauthorized resource accumulation, account manipulation, or further abuse within the SeaCMS platform.

References include the vendor site at http://seacms.com and a technical analysis at https://blog.csdn.net/weixin_46686336/article/details/144797242, which may provide additional details on detection or remediation.

Details

CWE(s)

Affected Products

seacms
seacms
13.1

CVEs Like This One

CVE-2024-54880Same product: Seacms Seacms
CVE-2025-22974Same product: Seacms Seacms
CVE-2025-25516Same product: Seacms Seacms
CVE-2025-25517Same product: Seacms Seacms
CVE-2025-25521Same product: Seacms Seacms
CVE-2025-25513Same product: Seacms Seacms
CVE-2025-25519Same product: Seacms Seacms
CVE-2025-25520Same product: Seacms Seacms
CVE-2025-25515Same product: Seacms Seacms
CVE-2024-56973Shared CWE-281

References