CVE-2024-57610

A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
References
Link Resource
https://github.com/Sylius/Sylius Product
https://github.com/nca785/CVE-2024-57610 Exploit Third Party Advisory
https://sylius.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:sylius:sylius:2.0.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-02-06 18:15

Updated : 2025-09-19 19:07


NVD link : CVE-2024-57610

Mitre link : CVE-2024-57610

CVE.ORG link : CVE-2024-57610


JSON object : View

Products Affected

sylius

  • sylius
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts