Impact
A cross‑site request forgery vulnerability exists in Fujitsu’s Musetheque V4 Information Disclosure for IPKNOWLEDGE releases V4L1 rev2203.0 and earlier. The description states that a logged‑in user who views a malicious web page may trigger unexpected operations, implying that the application accepts state‑changing requests without protecting against CSRF. This lack of protection could let an attacker alter data, perform administrative actions, or otherwise manipulate the user’s account without the user’s explicit intention.
Affected Systems
The affected product is Fujitsu Japan Limited’s Musetheque V4 Information Disclosure for IPKNOWLEDGE, specifically version V4L1 rev2203.0 and all prior releases. No other vendors, products, or newer versions are mentioned as affected.
Risk and Exploitability
The flaw registers a CVSS score of 8.5, indicating high severity. EPSS information is not available and the vulnerability is not listed in CISA’s KEV catalog. While the exact exploitation probability is unknown, the likely attack vector is an external web page that a logged‑in user may visit; such a page would issue requests to the target application. Based on the description it is inferred that no CSRF token validation is performed, making the exploitation path straightforward for a motivated adversary.
OpenCVE Enrichment