CVE-2024-50620

Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and document manage components in CIPPlanner CIPAce before 9.17. An authorized user can upload executable files when inserting images in the rich text editor, and upload executable files when uploading files on the document management page. Those executables can be executed if they are not stored in a shared directory or if the storage directory has executed permissions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:*

History

20 Feb 2026, 20:18

Type Values Removed Values Added
References () https://cipplanner.com/cve-2024-50620-cve-public-notification-of-resolution/ - () https://cipplanner.com/cve-2024-50620-cve-public-notification-of-resolution/ - Vendor Advisory
References () https://www.facebook.com/people/CIPPlanner-Corporation/100082985059905/ - () https://www.facebook.com/people/CIPPlanner-Corporation/100082985059905/ - Permissions Required
First Time Cipplanner cipace
Cipplanner
CPE cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:*

12 Feb 2026, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-434

11 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-11 21:16

Updated : 2026-02-20 20:18


NVD link : CVE-2024-50620

Mitre link : CVE-2024-50620

CVE.ORG link : CVE-2024-50620


JSON object : View

Products Affected

cipplanner

  • cipace
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type