CVE-2024-10505

Source
https://cve.org/CVERecord?id=CVE-2024-10505
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10505.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-10505
Published
2024-10-30T02:15:02.430Z
Modified
2025-11-20T12:23:00.963450Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Initially two separate issues were created by the researcher for the different function calls. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/wuzhicms/wuzhicms

Affected ranges

Type
GIT
Repo
https://github.com/wuzhicms/wuzhicms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v2.*
v2.0.1
v2.0.4
v2.0.5
v2.1.2
v2.1.3
v2.1.6
v2.1.7
v3.*
v3.0.1
v3.0.3
v3.0.3.0
v3.0.4
v3.0.4.0
v3.1.0
v3.1.0.1
v3.1.0.2
v3.1.1
v3.1.2
v3.1.3
v4.*
v4.0.0
v4.1.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10505.json"