Description
A vulnerability was detected in technical-laohu mpay up to 1.2.4. This affects an unknown function. Performing a manipulation results in cross-site request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Published: 2026-01-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Patch
AI Analysis

Impact

An unknown function in technical‑laohu mpay allows a remote attacker to perform a cross‑site request forgery (CSRF) attack. The vulnerability lets the attacker craft a malicious web request that, when executed in the context of an authenticated user’s browser, can induce the user to trigger unintended actions on the mpay application. The effect is a compromise of integrity and authorization, potentially leading to unauthorized transactions or configuration changes.

Affected Systems

technical‑laohu mpay software versions up to and including 1.2.4 are affected. Users running any of these releases should verify their current version and check for updates.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity. The EPSS score of <1% implies a low probability of widespread exploitation currently. The exploit is listed in public advisories. The CVE description states that the vulnerability permits remote execution of a CSRF attack. The likely attack vector is a remote attacker sending a crafted request from a malicious site, and it is inferred that the victim must be logged into the mpay application and therefore have an active session cookie in the browser. Because the attack relies on the victim’s browser to send the request, direct server access is not required. The bug is not listed in CISA’s KEV catalog.

Generated by OpenCVE AI on April 18, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade technical‑laohu mpay to a version newer than 1.2.4, which removes the vulnerable CSRF endpoint.
  • Ensure that all state‑changing endpoints require a CSRF token or verify the Origin/Referer header and reject requests that lack valid tokens.
  • Configure the application to require re‑authentication or additional confirmation for sensitive actions such as financial transactions to add a second layer of protection.

Generated by OpenCVE AI on April 18, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:technical-laohu:mpay:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Technical-laohu
Technical-laohu mpay
Vendors & Products Technical-laohu
Technical-laohu mpay

Mon, 19 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in technical-laohu mpay up to 1.2.4. This affects an unknown function. Performing a manipulation results in cross-site request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Title technical-laohu mpay cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Technical-laohu Mpay
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:45:38.258Z

Reserved: 2026-01-18T13:59:52.264Z

Link: CVE-2026-1153

cve-icon Vulnrichment

Updated: 2026-01-20T21:30:07.287Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T13:16:20.007

Modified: 2026-02-06T19:51:21.413

Link: CVE-2026-1153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses