Cyber Posture

CVE-2024-13200

HighPublic PoC

Published: 09 January 2025

Published
09 January 2025
Modified
22 August 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0008 23.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-13200 is a critical vulnerability involving improper access controls in the wander-chu SpringBoot-Blog version 1.0. It affects the preHandle function within the file src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java, part of the HTTP POST Request Handler component. The issue, linked to CWE-266 and CWE-284, allows manipulation that bypasses access restrictions.

The vulnerability can be exploited remotely by unauthenticated attackers with network access, requiring low complexity and no user interaction, as indicated by its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation grants low-level impacts on confidentiality, integrity, and availability.

Advisories from sources including VulDB and GitHub issues for the SpringBoot-Blog repository detail the vulnerability and note that the vendor was contacted early regarding disclosure but provided no response. No patches or mitigations are mentioned in the available information.

The exploit has been publicly disclosed and may be actively used, with references available on GitHub and VulDB.

Details

CWE(s)
CWE-266CWE-284NVD-CWE-noinfo

Affected Products

wander-chu
springboot-blog
1.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an improper access control (permission bypass) in a public-facing SpringBoot-Blog application, allowing remote unauthenticated attackers to send HTTP POST requests that bypass login and modify website content. This enables T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) as explicitly mapped in the advisory.

References