Impact
Bludit 3.16.1 allows cross‑site request forgery against the /admin/uninstall-plugin/ and /admin/install-theme/ endpoints because it lacks anti‑CSRF tokens or request origin validation. An attacker can induce an authenticated administrator to visit a malicious page that silently submits crafted requests, resulting in untrusted code being installed as a theme or critical plugins being removed. This damages normal operations, may embed malicious code, and can compromise the overall system integrity.
Affected Systems
Bludit – the content management system – is affected for version 3.16.1 and all earlier releases. Any installation of Bludit using these versions is vulnerable to the described CSRF exploit.
Risk and Exploitability
The CVSS score is 5.1, indicating moderate severity. The EPSS score is below 1 %, suggesting a low but nonzero probability of exploitation in the wild, and the vulnerability is not listed in the KEV catalogue. The attack vector is browser‑based CSRF; it requires the attacker to persuade a logged‑in administrator to visit a crafted page, after which the browser will send the privileged request. No additional system compromise is required beyond the administrator session, making the flaw readily exploitable on any site with an exposed admin interface.
OpenCVE Enrichment