CVE-2024-50617
Analyzed Analyzed - Analysis Complete
Unauthorized File Download in CIPPlanner CIPAce File Handlers

Publication date: 2026-02-11

Last updated on: 2026-02-13

Assigner: MITRE

Description
Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. (Retrieval is not intended without correct data access configured for documents.)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-13
Generated
2026-05-07
AI Q&A
2026-02-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cipplanner cipace to 9.17 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the File Download and Get File handler components of CIPPlanner CIPAce versions before 9.17. It allows attackers who are authenticated users to download files they are not authorized to access. This is possible because the attacker can manipulate the file id parameter or directly provide the physical file path in the URL query string to retrieve files. The system does not properly enforce data access controls for documents, enabling unauthorized file retrieval.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive or confidential files. An attacker with valid credentials can access files they should not be able to see by manipulating URL parameters. This can result in data breaches, loss of confidentiality, and potential exposure of sensitive information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart