ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
References
Link | Resource |
---|---|
https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md | Broken Link Exploit Third Party Advisory |
Configurations
History
23 Apr 2025, 15:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:* | |
References | () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md - Broken Link, Exploit, Third Party Advisory | |
First Time |
Zzcms zzcms
Zzcms |
Information
Published : 2024-09-04 16:15
Updated : 2025-04-23 15:01
NVD link : CVE-2024-44821
Mitre link : CVE-2024-44821
CVE.ORG link : CVE-2024-44821
JSON object : View
Products Affected
zzcms
- zzcms
CWE
CWE-287
Improper Authentication