CVE-2024-54879
Published: 06 January 2025
Summary
CVE-2024-54879 is a critical-severity Improper Preservation of Permissions (CWE-281) vulnerability in Seacms Seacms. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 11.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly preventing the logic flaw that allows unauthorized recharging of member accounts.
Explicitly identifies and authorizes only specific actions performable without identification or authentication, blocking unauthenticated recharge exploitation.
Applies least privilege to restrict recharge capabilities to only necessary authorized users or roles, mitigating indefinite unauthorized recharges by any user.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated network exploitation of public-facing SeaCMS web app logic flaw enables indefinite unauthorized account recharging/manipulation.
NVD Description
SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely.
Deeper analysisAI
CVE-2024-54879 is an incorrect access control vulnerability (CWE-281) affecting SeaCMS version 13.1. The issue stems from a logic flaw that enables exploitation to allow any user to recharge members indefinitely. Published on January 6, 2025, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), reflecting critical severity due to high impacts on confidentiality and integrity.
Unauthenticated attackers (PR:N) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows indefinite recharging of member accounts, potentially enabling unauthorized resource accumulation, account manipulation, or further abuse within the SeaCMS platform.
References include the vendor site at http://seacms.com and a technical analysis at https://blog.csdn.net/weixin_46686336/article/details/144797242, which may provide additional details on detection or remediation.
Details
- CWE(s)