CVE-2024-57610

A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
References
Link Resource
https://github.com/Sylius/Sylius Product
https://github.com/nca785/CVE-2024-57610 Exploit Third Party Advisory
https://sylius.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:sylius:sylius:2.0.2:*:*:*:*:*:*:*

History

19 Sep 2025, 19:07

Type Values Removed Values Added
CPE cpe:2.3:a:sylius:sylius:2.0.2:*:*:*:*:*:*:*
References () https://github.com/Sylius/Sylius - () https://github.com/Sylius/Sylius - Product
References () https://github.com/nca785/CVE-2024-57610 - () https://github.com/nca785/CVE-2024-57610 - Exploit, Third Party Advisory
References () https://sylius.com/ - () https://sylius.com/ - Product
First Time Sylius
Sylius sylius

07 Feb 2025, 16:15

Type Values Removed Values Added
CWE CWE-307
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

07 Feb 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) Un problema de limitación de velocidad en Sylius v2.0.2 permite a un atacante remoto realizar ataques de fuerza bruta sin restricciones en cuentas de usuario, lo que aumenta significativamente el riesgo de comprometer la cuenta y denegar el servicio para usuarios legítimos.
Summary (en) A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. (en) A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.

06 Feb 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-06 18:15

Updated : 2025-09-19 19:07


NVD link : CVE-2024-57610

Mitre link : CVE-2024-57610

CVE.ORG link : CVE-2024-57610


JSON object : View

Products Affected

sylius

  • sylius
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts