CVE-2024-32872:
Umbraco Workflow's Backoffice users can execute arbitrary SQL
5.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/24/2024
Updated
4/24/2024
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Umbraco.Workflow | nuget | < 10.3.9 | 10.3.9 |
Umbraco.Workflow | nuget | >= 11.0.0-rc1, < 12.2.6 | 12.2.6 |
Umbraco.Workflow | nuget | >= 13.0.0-rc1, < 13.0.6 | 13.0.6 |
Plumber.Workflow | nuget | < 10.1.2 | 10.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves SQL injection through API endpoint manipulation. Analysis focused on:
- Controller actions handling Backoffice API requests
- SQL execution methods processing user input
- Patch notes indicating input validation improvements
While exact code changes aren't visible, the pattern matches:
- API controller methods receiving user input
- Service layer methods executing raw SQL Confidence is medium due to typical vulnerability patterns in web applications, though specific function names are inferred from architectural conventions