Vulnerability Description
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.5, 7.3.12, and 7.2.7 contain a fix for the issue.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/MasaCMS/MasaCMS/commit/259fc6061d022d5025a3289a3f8de9852ad9c9
- https://github.com/MasaCMS/MasaCMS/commit/280489e2d6c8daf5022fdb0225235462dd9d45
- https://github.com/MasaCMS/MasaCMS/commit/3d6319b8775bb6438bc822d845926990511f50
- https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-24rr-gwx3-jhqc
- https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS
- https://projectdiscovery.io/blog/hacking-apple-with-sql-injection?ref=projectdis
- https://www.seebug.org/vuldb/ssvid-99835
FAQ
What is CVE-2024-32640?
CVE-2024-32640 is a vulnerability with a CVSS score of 9.8 (CRITICAL). MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` meth...
How severe is CVE-2024-32640?
CVE-2024-32640 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-32640?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.