VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

CSRF in aimhubio/aim

CVE-2024-7760

Description

aimhubio/aim version 3.22.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the tracking server. The vulnerability is due to overly permissive CORS settings, allowing cross-origin requests from all origins. This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cross-Site Request Forgery (CSRF) in aimhubio/aim 3.22.0 due to overly permissive CORS settings, enabling attacks on all tracking server endpoints.

Vulnerability

Analysis

CVE-2024-7760 describes a Cross-Site Request Forgery (CSRF) vulnerability in the aimhubio/aim tracking server version 3.22.0. The root cause is an overly permissive CORS (Cross-Origin Resource Sharing) configuration that allows cross-origin requests from all origins (*). This misconfiguration enables an attacker to craft malicious web pages that can trigger unauthorized actions on behalf of an authenticated user against the tracking server [1][2].

Exploitation

Scenario

An attacker can exploit this vulnerability by tricking a victim who is currently authenticated to an aim tracking server into visiting a malicious page. Because the CORS policy allows any origin, the attacker's page can make arbitrary cross-origin requests to the tracking server's endpoints, inheriting the victim's session credentials. The vulnerability affects all endpoints of the tracking server, meaning an attacker can interact with any API without restriction [2][3].

Impact

The CSRF vulnerability is particularly severe because it can be chained with other existing vulnerabilities in aim, such as remote code execution (RCE), denial of service (DoS), and arbitrary file read/write. By combining CSRF with these exploits, an attacker could achieve full compromise of the tracking server and its data, including execution of arbitrary code on the server, making the attack impact critical [2].

Mitigation

Status

As of the publication date, the vulnerability exists in aim version 3.22.0. Users are advised to update to a patched version as soon as one becomes available. The project maintainers should implement proper CORS origin validation to only allow trusted domains, and users should consider additional protections such as CSRF tokens and same-site cookie attributes. No CVE was found that supersedes this one in the references; the provided references link to the project page [1], the NVD entry [2], and the Huntr bounty page [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
aimPyPI
<= 3.22.0

Affected products

3
  • Aimhubio/Aimllm-fuzzy
    Range: = 3.22.0
  • ghsa-coords
    Range: <= 3.22.0
  • aimhubio/aimhubio/aimv5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.