Impact
QuickCMS lacks CSRF protection on multiple endpoints. Based on the description, an attacker can craft a web page that automatically submits POST requests on behalf of a user who is logged in. The flaw follows CWE‑352. While the advisory does not explicitly state it, it is inferred that the attacker could perform any actions the victim can, such as editing or deleting content, directly from the victim’s browser.
Affected Systems
OpenSolution QuickCMS is affected. Version 6.8 has been confirmed vulnerable; other releases have not been tested but may also be susceptible.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.1, indicating moderate impact. The EPSS score is below 1 %, indicating a low current likelihood of exploitation, and it is not listed in the CISA KEV catalog. The likely attack vector is a social engineering or phishing scenario where the victim visits a malicious site while logged into the CMS; this inference is based on the description of the payload being automatically sent with the victim’s privileges.
OpenCVE Enrichment