Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-54v4-4685-vwrj | alextselegidis/easyappointments is Vulnerable to CSRF Protection Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover. | |
| Title | CSRF Protection Bypass: Sensitive endpoints accept GET requests, enabling admin account takeover | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-15T21:34:43.098Z
Reserved: 2026-01-14T16:08:37.482Z
Link: CVE-2026-23622
Updated: 2026-01-15T21:34:14.796Z
Status : Received
Published: 2026-01-15T20:16:05.773
Modified: 2026-01-15T22:16:12.957
Link: CVE-2026-23622
No data.
OpenCVE Enrichment
No data.
Github GHSA