Description
The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to restore deleted content from the trash to unauthorized locations through CSRF. The vulnerable cTrash.restore function lacks CSRF token validation, enabling malicious websites to forge requests that restore content to arbitrary parent locations when an authenticated administrator visits a crafted webpage. Successful exploitation of the Trash Restore CSRF vulnerability results in unauthorized restoration of deleted content to potentially inappropriate or malicious locations within the MuraCMS website structure. When an authenticated administrator visits a malicious webpage containing the CSRF exploit, their browser automatically submits a hidden form that restores specified content from the trash to a location determined by the attacker through the parentid parameter. This can lead to restoration of previously deleted malicious content, placement of sensitive documents in public areas, manipulation of website navigation structure, or restoration of outdated content that was intentionally removed for security or compliance reasons.
Published: 2026-03-18
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery enabling unauthorized restoration of deleted content
Action: Immediate Patch
AI Analysis

Impact

The cTrash.restore function in MuraCMS releases through version 10.1.10 accepts a parentid parameter without validating a CSRF token. This flaw allows a malicious site to issue a forged request that restores content from the trash to any parent location within the site hierarchy. When an authenticated administrator visits the attacker‑controlled page, the browser automatically submits the hidden form, bringing back deleted items into places chosen by the attacker. The result is that previously removed content—potentially malicious, sensitive, or non‑compliant material—can be re‑published, exposing confidential data, altering navigation, or re‑introducing outdated pages.

Affected Systems

Vulnerable instances of MuraCMS up to and including version 10.1.10 are at risk. No specific vendor or product sub‑listing beyond MuraCMS is noted, but the CPE entry identifies the generic CMS product.

Risk and Exploitability

With a CVSS score of 8.8 the vulnerability is classified as high severity. The EPSS score is listed as less than 1 %, indicating that exploitation is not commonly observed in the wild, and the issue is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector requires an authenticated administrator to load a malicious webpage; thus, user awareness and credential protection are critical. Once the crafted request is made, the attacker can redirect content to arbitrary parts of the site without further interaction.

Generated by OpenCVE AI on March 20, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest MuraCMS release that includes a CSRF check for the cTrash.restore function; consult the MuraCMS release notes for the exact version that resolves the issue.

Generated by OpenCVE AI on March 20, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Unauthorized Content Restoration via CSRF in MuraCMS Trash Restore

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:murasoftware:mura_cms:-:*:*:*:*:*:*:*

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Murasoftware
Murasoftware mura Cms
Vendors & Products Murasoftware
Murasoftware mura Cms

Wed, 18 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to restore deleted content from the trash to unauthorized locations through CSRF. The vulnerable cTrash.restore function lacks CSRF token validation, enabling malicious websites to forge requests that restore content to arbitrary parent locations when an authenticated administrator visits a crafted webpage. Successful exploitation of the Trash Restore CSRF vulnerability results in unauthorized restoration of deleted content to potentially inappropriate or malicious locations within the MuraCMS website structure. When an authenticated administrator visits a malicious webpage containing the CSRF exploit, their browser automatically submits a hidden form that restores specified content from the trash to a location determined by the attacker through the parentid parameter. This can lead to restoration of previously deleted malicious content, placement of sensitive documents in public areas, manipulation of website navigation structure, or restoration of outdated content that was intentionally removed for security or compliance reasons.
References

Subscriptions

Murasoftware Mura Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-19T13:51:44.064Z

Reserved: 2025-08-06T00:00:00.000Z

Link: CVE-2025-55044

cve-icon Vulnrichment

Updated: 2026-03-19T13:51:33.757Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T16:16:23.550

Modified: 2026-03-20T18:11:46.643

Link: CVE-2025-55044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:10Z

Weaknesses