CVE-2024-3408
CRITICAL EXPLOITED NUCLEID-Tale RCE
Title source: metasploitDescription
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.
Exploits (2)
metasploit
WORKING POC
EXCELLENT
by taiphung217, Takahiro Yokoyama · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dtale_rce_cve_2025_0655.rb
Nuclei Templates (1)
D-Tale 3.10.0 - 3.15.1 - Authentication Bypass & Remote Code Execution
CRITICALVERIFIEDby ohmygod20260203
Shodan:
title:"D-Tale"
FOFA:
title="D-Tale"
Scores
CVSS v3
9.8
EPSS
0.9130
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-12-19
CWE
CWE-94
CWE-798
Status
published
Products (2)
man/d-tale
3.10.0
pypi/dtale
0PyPI
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026