First published: Tue Oct 29 2024(Updated: )
A User enumeration vulnerability in AquilaCMS 1.409.20 and prior allows unauthenticated attackers to obtain email addresses via the "Add a user" feature. The vulnerability occurs due to insufficiently validated user input being processed as a regular expression, which is then matched against email addresses to find duplicate entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AquilaCMS | <1.409.20 | |
Aquila-cms Aquilacms | <=1.409.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48572 is classified as a user enumeration vulnerability, allowing unauthorized access to email addresses.
To fix CVE-2024-48572, update AquilaCMS to version 1.409.21 or later, which addresses the user input validation issue.
AquilaCMS versions up to and including 1.409.20 are affected by CVE-2024-48572.
CVE-2024-48572 is caused by insufficient validation of user inputs that are processed as regular expressions in the 'Add a user' feature.
An attacker can exploit CVE-2024-48572 to enumerate valid email addresses through the unauthenticated 'Add a user' feature.