HomeFortraCVE-2024-5276

CVE-2024-5276

CRITICAL
9.8CVSS
Published: 2024-06-25
Updated: 2025-04-04
AI Analysis

Description

A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-20CWE-89CWE-89

Metadata

Primary Vendor
FORTRA
Published
6/25/2024
Last Modified
4/4/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

fortra : filecatalyst_workflowfortra : filecatalyst_workflowfortra : filecatalyst_workflowfortra : filecatalyst_workflowfortra : filecatalyst_workflowfortra : filecatalyst_workflowfortra : filecatalyst_workflow

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-5276 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com