Description
CMSsite 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious HTML forms. Attackers can trick authenticated administrators into visiting crafted pages that submit POST requests to the users.php endpoint with parameters like source=add_user, source=edit_user, or del=1 to create, modify, or delete admin accounts.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized administrative account creation, modification, or deletion via CSRF
Action: Apply Patch
AI Analysis

Impact

CMSsite 1.0 is vulnerable to cross‑site request forgery on the users.php endpoint. An attacker can embed malicious HTML forms that, when visited by a logged‑in administrator, automatically submit POST requests carrying parameters such as source=add_user, source=edit_user, or del=1. This flaw permits the attacker to create, alter, or delete admin user accounts without proper authorization. The vulnerability is a classic example of CWE‑352, leading to unauthorized privilege escalation and potential compromise of the entire administrative control plane. The impact is primarily integrity and confidentiality of the administrative domain, as the attacker can subvert the system’s intended user management.

Affected Systems

The affected product is CMSsite 1.0, developed by VictorAlagwu. The specific version referenced is 1.0, and the CPE string cpe:2.3:a:victoralagwu:cmssite:1.0 indicates the vulnerable release.

Risk and Exploitability

The CVSS score of 5.3 places the vulnerability in the medium severity range. The EPSS score of less than 1% suggests that the likelihood of widespread exploitation in the immediate future is low, and the vulnerability is not listed in the CISA KEV catalog. However, a successful CSRF attack requires the victim to be an authenticated administrator who is lured to a crafted page, an event that can be engineered with social engineering techniques. Attackers would exploit the flaw by hosting malicious content that triggers the POST request, leveraging the victim’s existing session credentials.

Generated by OpenCVE AI on April 9, 2026 at 20:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the project's GitHub repository for available patches or newer releases and upgrade to the latest version of CMSsite.
  • If a patch is not yet released, restrict access to the users.php endpoint by limiting it to trusted IP addresses or by disabling administrative functions until a fix is applied.
  • As a temporary countermeasure, add server‑side CSRF token validation to all administrative POST requests to prevent unauthorized form submissions.

Generated by OpenCVE AI on April 9, 2026 at 20:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:victoralagwu:cmssite:1.0:*:*:*:*:*:*:*

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Victoralagwu
Victoralagwu cmssite
Vendors & Products Victoralagwu
Victoralagwu cmssite

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description CMSsite 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious HTML forms. Attackers can trick authenticated administrators into visiting crafted pages that submit POST requests to the users.php endpoint with parameters like source=add_user, source=edit_user, or del=1 to create, modify, or delete admin accounts.
Title CMSsite 1.0 Cross-Site Request Forgery via users.php
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Victoralagwu Cmssite
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:27:11.308Z

Reserved: 2026-04-05T15:16:06.447Z

Link: CVE-2019-25682

cve-icon Vulnrichment

Updated: 2026-04-06T15:08:15.899Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:46.630

Modified: 2026-04-09T19:31:50.240

Link: CVE-2019-25682

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:21Z

Weaknesses