A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
History

Sat, 05 Apr 2025 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Fortra
Fortra filecatalyst Workflow
CPEs cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:-:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build114:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build126:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build130:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build135:*:*:*:*:*:*
Vendors & Products Fortra
Fortra filecatalyst Workflow

cve-icon MITRE

Status: PUBLISHED

Assigner: Fortra

Published:

Updated: 2024-08-01T21:11:12.427Z

Reserved: 2024-05-23T16:28:47.722Z

Link: CVE-2024-5276

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.427Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-25T20:15:14.013

Modified: 2025-04-04T23:59:36.307

Link: CVE-2024-5276

cve-icon Redhat

No data.