CVE-2024-32491

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:znuny:znuny:*:*:*:*:lts:*:*:*
cpe:2.3:a:znuny:znuny:*:*:*:*:-:*:*:*

History

02 Sep 2025, 21:21

Type Values Removed Values Added
References () https://www.znuny.org/en/advisories/zsa-2024-01 - () https://www.znuny.org/en/advisories/zsa-2024-01 - Vendor Advisory
References () https://znuny.com - () https://znuny.com - Product
CPE cpe:2.3:a:znuny:znuny:*:*:*:*:lts:*:*:*
cpe:2.3:a:znuny:znuny:*:*:*:*:-:*:*:*
First Time Znuny znuny
Znuny

Information

Published : 2024-04-29 17:15

Updated : 2025-09-02 21:21


NVD link : CVE-2024-32491

Mitre link : CVE-2024-32491

CVE.ORG link : CVE-2024-32491


JSON object : View

Products Affected

znuny

  • znuny
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')