CVE-2024-44821

ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*

History

23 Apr 2025, 15:01

Type Values Removed Values Added
CPE cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*
References () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md - () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md - Broken Link, Exploit, Third Party Advisory
First Time Zzcms zzcms
Zzcms

Information

Published : 2024-09-04 16:15

Updated : 2025-04-23 15:01


NVD link : CVE-2024-44821

Mitre link : CVE-2024-44821

CVE.ORG link : CVE-2024-44821


JSON object : View

Products Affected

zzcms

  • zzcms
CWE
CWE-287

Improper Authentication