{"vulnerability": "CVE-2024-55963", "sightings": [{"uuid": "4151f18b-601f-461e-bbfa-9b99abe54678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/appsmith_rce_cve_2024_55964.rb", "content": "", "creation_timestamp": "2025-04-07T14:00:17.000000Z"}, {"uuid": "80c7a882-bbd1-495a-a64c-dff83ce1b75d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8963", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55963\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Appsmith before 1.51. A user on Appsmith that doesn't have admin permissions can trigger the restart API on Appsmith, causing a server restart. This is still within the Appsmith container, and the impact is limited to Appsmith's own server only, but there is a denial of service because it can be continually restarted. This is due to incorrect access control checks, which should check for super user permissions on the incoming request.\n\ud83d\udccf Published: 2025-03-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T20:09:16.461Z\n\ud83d\udd17 References:\n1. https://github.com/appsmithorg/appsmith/security/advisories/GHSA-6mc8-hw5c-7qqr", "creation_timestamp": "2025-03-26T20:25:52.000000Z"}, {"uuid": "ce0119a9-d4c9-4f39-9f16-6d54caed4720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/P0x3k_1N73LL1G3NC3/53", "content": "CVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith\n\nBlog: https://rhinosecuritylabs.com/research/cve-2024-55963-unauthenticated-rce-in-appsmith/", "creation_timestamp": "2025-03-26T04:51:22.000000Z"}, {"uuid": "7094242b-a1f7-46c7-b41a-2745af09d5ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/8406", "content": "#exploit\n1. CVE-2024-55963:\nUnauth RCE in Default-Install of Appsmith\nhttps://rhinosecuritylabs.com/research/cve-2024-55963-unauthenticated-rce-in-appsmith\n\n2. CVE-2025-26909:\nLFI to RCE in WP Ghost Plugin\nhttps://github.com/zerodayx/cve-2025-26909\n\n3. CVE-2025-27840:\nVulnerability in ESP32 Microcontrollers\nhttps://github.com/demining/Bluetooth-Attacks-CVE-2025-27840", "creation_timestamp": "2025-03-31T18:38:27.000000Z"}, {"uuid": "ea2f0e0c-c696-41a5-a477-fe4319e07a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctfbrqb2v", "content": "", "creation_timestamp": "2025-04-04T21:02:08.424318Z"}, {"uuid": "e3b9443b-6622-4a37-88aa-56ff85110278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://t.me/cvedetector/21219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55963 - Appsmith DoS: Unauthorized Server Restart\", \n  \"Content\": \"CVE ID : CVE-2024-55963 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : An issue was discovered in Appsmith before 1.51. A user on Appsmith that doesn't have admin permissions can trigger the restart API on Appsmith, causing a server restart. This is still within the Appsmith container, and the impact is limited to Appsmith's own server only, but there is a denial of service because it can be continually restarted. This is due to incorrect access control checks, which should check for super user permissions on the incoming request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:22.000000Z"}, {"uuid": "f74eedee-1e46-472b-b779-33ce4d9a63bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "Telegram/ziOVGRU4cKcimSIJ_E6PMSYJvnmBXzqpvenCO7rqIs6XBvg", "content": "", "creation_timestamp": "2025-07-06T15:00:06.000000Z"}, {"uuid": "c26f09de-5f22-44bf-ab40-87740b0b85f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/445", "content": "Top Security News for Today\n\nAn Introduction to Data Masking in Privacy Engineering  \nhttps://www.tripwire.com/state-of-security/introduction-data-masking-privacy-engineering\n\nMAS Compliance 101: Key Regulations for Financial Institutions in Singapore  \nhttps://www.tripwire.com/state-of-security/mas-compliance-key-regulations-financial-institutions-singapore\n\nFrida 16.7.0 is out w/ brand new APIs for observing the lifecycles of threads and modules  \nhttps://www.reddit.com/r/netsec/comments/1jjg9kq/frida_1670_is_out_w_brand_new_apis_for_observing/\n\nReport on Paragon Spyware  \nhttps://www.schneier.com/blog/archives/2025/03/report-on-paragon-spyware.html\n\nCVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin  \nhttps://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html\n\nCVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith  \nhttps://www.reddit.com/r/netsec/comments/1jjnjam/cve202455963_unauthenticated_rce_in/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-26T09:30:16.000000Z"}, {"uuid": "95b75956-23ef-4087-ba94-7129d170190f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3335", "content": "#exploit\n1. CVE-2024-55963:\nUnauth RCE in Default-Install of Appsmith\nhttps://rhinosecuritylabs.com/research/cve-2024-55963-unauthenticated-rce-in-appsmith\n\n2. CVE-2025-26909:\nLFI to RCE in WP Ghost Plugin\nhttps://github.com/zerodayx/cve-2025-26909\n\n3. CVE-2025-27840:\nVulnerability in ESP32 Microcontrollers\nhttps://github.com/demining/Bluetooth-Attacks-CVE-2025-27840", "creation_timestamp": "2025-03-31T18:38:27.000000Z"}, {"uuid": "da2cb60f-6fb3-4086-9f7b-04eb75f00dcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://t.me/CyberBulletin/2828", "content": "\u26a1CVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith.\n\n#CyberBulletin", "creation_timestamp": "2025-03-26T17:58:08.000000Z"}, {"uuid": "f1a5dcc0-f130-42b1-b081-3d031f0551c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9758", "content": "CVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith\n\nhttps://rhinosecuritylabs.com/research/cve-2024-55963-unauthenticated-rce-in-appsmith/", "creation_timestamp": "2025-03-25T22:16:47.000000Z"}, {"uuid": "09eaa7f2-1d87-44c7-81aa-1b696474426a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11988", "content": "#exploit\n1. CVE-2024-55963:\nUnauth RCE in Default-Install of Appsmith\nhttps://rhinosecuritylabs.com/research/cve-2024-55963-unauthenticated-rce-in-appsmith\n\n2. CVE-2025-26909:\nLFI to RCE in WP Ghost Plugin\nhttps://github.com/zerodayx/cve-2025-26909\n\n3. CVE-2025-27840:\nVulnerability in ESP32 Microcontrollers\nhttps://github.com/demining/Bluetooth-Attacks-CVE-2025-27840", "creation_timestamp": "2025-03-31T12:29:08.000000Z"}, {"uuid": "e88944ed-f995-4fb8-a440-315538625c00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://bsky.app/profile/cyberresearch.bsky.social/post/3lla7giapmn2p", "content": "", "creation_timestamp": "2025-03-25T21:24:36.287214Z"}, {"uuid": "fe119730-8348-42ea-a47e-b008904f82ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lldhdfoxav2t", "content": "", "creation_timestamp": "2025-03-27T04:24:01.972532Z"}, {"uuid": "d482d026-c95c-4437-984e-3c42c5b56d9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3ll7su2ssvy2a", "content": "", "creation_timestamp": "2025-03-25T17:39:32.499357Z"}, {"uuid": "217cf432-2509-431e-adf1-d861125f3b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "4d2f1471-57d4-4803-a286-55862dbaf2c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "7276137c-41fc-4034-a26f-a886034a2ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "published-proof-of-concept", "source": "Telegram/rldrVU4EbTTnPd8U3W40-F0FQeroqHkK7JRuQCr9iPTQCg8", "content": "", "creation_timestamp": "2025-07-06T03:00:04.000000Z"}, {"uuid": "3cef0a39-304c-4f8c-90a8-c17eb51c1739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55963", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3ll7ppfyype2q", "content": "", "creation_timestamp": "2025-03-25T16:43:16.676769Z"}]}