CVE-2025-24372

7.3 HIGH

📋 TL;DR

CVE-2025-24372 is a cross-site scripting (XSS) vulnerability in CKAN data management systems that allows authenticated users to upload malicious files containing executable code. When an administrator opens these files, the attacker can perform privilege escalation or other malicious actions. This affects CKAN versions before 2.10.7 and 2.11.2.

💻 Affected Systems

Products:
  • CKAN
Versions: All versions prior to CKAN 2.10.7 and 2.11.2
Operating Systems: All platforms running CKAN
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; exploitation depends on administrator interaction with malicious files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges, leading to complete system compromise, data theft, or further attacks on the data portal and connected systems.

🟠

Likely Case

Authenticated users escalate privileges to administrator level, gaining unauthorized access to sensitive data and system controls.

🟢

If Mitigated

With proper file upload restrictions or patching, the attack vector is eliminated, preventing code execution through uploaded files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user registration, file upload capability, and administrator interaction with the malicious file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CKAN 2.10.7 and 2.11.2

Vendor Advisory: https://github.com/ckan/ckan/commit/7da6a26c6183e0a97a356d1b1d2407f3ecc7b9c8

Restart Required: No

Instructions:

1. Backup your CKAN instance and database. 2. Upgrade to CKAN 2.10.7 or 2.11.2 using your package manager or source installation method. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure CKAN to only allow safe file types for upload by users and groups.

ckan.upload.user.types = 'safe_mimetype1 safe_mimetype2'
ckan.upload.group.types = 'safe_mimetype1 safe_mimetype2'

Disable File Uploads

all

Completely disable file upload functionality for users.

ckan.upload.user.types = none

🧯 If You Can't Patch

  • Implement strict file upload restrictions using CKAN configuration options to block potentially malicious file types.
  • Monitor and audit file upload activities and administrator file interactions for suspicious behavior.

🔍 How to Verify

Check if Vulnerable:

Check your CKAN version; if it's below 2.10.7 or 2.11.2, you are vulnerable.

Check Version:

ckan --version

Verify Fix Applied:

Confirm your CKAN version is 2.10.7 or 2.11.2 or higher after upgrade.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads from authenticated users, especially with non-standard file extensions or MIME types
  • Administrator account activity showing access to recently uploaded files

Network Indicators:

  • HTTP requests uploading files with potential malicious payloads to CKAN endpoints

SIEM Query:

source="ckan_logs" AND (event="file_upload" AND file_type NOT IN ("safe_types")) OR (user="admin" AND action="file_access")

🔗 References

📤 Share & Export