Description
Redaxo CMS 5.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the users endpoint with hidden fields containing admin credentials and account parameters to add new administrator accounts without user consent.
Published: 2026-04-04
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation through Unauthorized Administrative Account Creation
Action: Apply Patch
AI Analysis

Impact

Redaxo CMS versions 4.7.2 and 5.2 contain a CSRF flaw that permits attackers to add new administrator accounts without the victim’s consent. By directing an authenticated administrator to a crafted HTML form that calls the users endpoint with hidden fields, an attacker can create high‑privilege accounts. The resulting new admin users grant the attacker full control over the CMS, enabling data theft, site defacement, or further compromise of connected services. This vulnerability is defined as a Cross‑Site Request Forgery weakness (CWE‑352).

Affected Systems

The vulnerability affects Redaxo CMS 4.7.2 and 5.2. Any installation of these releases, regardless of configuration, is susceptible if the users endpoint is reachable and the application accepts form submissions without validating request origin.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity; the EPSS score is below 1 %, suggesting a low probability of exploitation at present. The flaw is not listed in the CISA KEV catalog. Exploitation requires a legitimate administrator to be authenticated and to visit a malicious page, so the attacker must obtain a session cookie or rely on social engineering. The impact is high for systems where administrators remain online for prolonged periods or are not protected by additional anti‑CSRF controls. Because the attack vector is user‑initiated, mitigations such as timely updates, strong authentication practices, and CSRF protection significantly lower the risk.

Generated by OpenCVE AI on April 14, 2026 at 21:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Redaxo CMS to the latest stable version that removes the CSRF flaw.
  • Configure the application to enforce CSRF tokens on all endpoints that alter user data.
  • Restrict external access to the users management endpoint or implement role‑based access controls.
  • Monitor account creation logs for abnormal activity and review administrative privileges regularly.

Generated by OpenCVE AI on April 14, 2026 at 21:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Redaxo redaxo
CPEs cpe:2.3:a:redaxo:redaxo:5.2:*:*:*:*:*:*:*
Vendors & Products Redaxo redaxo

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Redaxo CMS 5.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the users endpoint with hidden fields containing admin credentials and account parameters to add new administrator accounts without user consent.
Title Redaxo CMS 5.2 Cross-Site Request Forgery via users endpoint
First Time appeared Redaxo
Redaxo redaxo Cms
Weaknesses CWE-352
CPEs cpe:2.3:a:redaxo:redaxo_cms:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redaxo:redaxo_cms:5.2:*:*:*:*:*:*:*
Vendors & Products Redaxo
Redaxo redaxo Cms
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Redaxo Redaxo Redaxo Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T13:29:32.027Z

Reserved: 2026-04-04T13:33:32.631Z

Link: CVE-2016-20053

cve-icon Vulnrichment

Updated: 2026-04-06T13:29:25.893Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-04T14:16:17.700

Modified: 2026-04-14T19:08:09.820

Link: CVE-2016-20053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses