Description
Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the delete, activate, and deactivate modes in modules/groups-roles/groups_roles.php perform destructive state changes on organizational roles but never validate an anti-CSRF token. The client-side UI passes a CSRF token to callUrlHideElement(), which includes it in the POST body, but the server-side handlers ignore $_POST["adm_csrf_token"] entirely for these three modes. An attacker who can discover a role UUID (visible in the public cards view when the module is publicly accessible) can embed a forged POST form on any external page and trick any user with the rol_assign_roles right into deleting or toggling roles for the organization. Role deletion is permanent and cascades to all memberships, event associations, and rights data. If exploited, an attacker can trick any user with delegated role-assignment rights into permanently deleting roles, mass-revoking all associated memberships and access to events, documents, and mailing lists, or silently activating or deactivating entire groups, with target role UUIDs trivially harvested from the unauthenticated public cards view and no undo path short of a database restore. This issue has been fixed in version 5.0.7.
Published: 2026-03-19
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized deletion or toggling of organizational roles by users with assignment rights
Action: Immediate Patch
AI Analysis

Impact

Admidio versions 5.0.0 through 5.0.6 allow role deletion, activation, and deactivation actions to be performed without validating a CSRF token. The server-side code accepts POST requests for these operations, ignoring the submitted CSRF value, while the client interface includes one. An attacker who knows a role UUID, which is exposed in public cards when the module is accessible, can craft a forged POST form on an external page and trick any user who holds the "rol_assign_roles" permission into executing destructive changes. Role deletion is irreversible and cascades to all related memberships, event associations, and rights data, leading to widespread loss of access to documents, mailing lists, and event participation. Since there is no undo capability beyond a database restore, the impact is severe for organizational integrity and data availability.

Affected Systems

The vulnerability affects the Admidio open‑source user management application under the vendor name Admidio, specifically versions 5.0.0 through 5.0.6. The issue was resolved in the subsequent release, Admidio 5.0.7, which adds proper CSRF validation to the affected operations. Users of the older releases are directly exposed to the risk unless they apply the patch.

Risk and Exploitability

The CVSS score of 5.7 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Successful exploitation requires that an attacker first identify a valid role UUID—which can be harvested from the public module view—and then persuade the user with "rol_assign_roles" rights to submit a forged form. The attack vector is web‑based, and no authentication bypass is necessary; however, the necessity of a privileged account reduces the overall risk exposure to organizations that strictly limit that role. Given the irreversible effects of role deletion, the potential damage warrants immediate action.

Generated by OpenCVE AI on March 23, 2026 at 20:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Admidio to version 5.0.7 or later, which implements CSRF validation for role delete, activate, and deactivate actions.
  • Review the application’s role management pages to confirm that all state‑changing operations now require a valid CSRF token.
  • Limit the "rol_assign_roles" privilege to trusted users and consider disabling public view of role identifiers to reduce discoverability of role UUIDs.
  • Enable logging for role modification events and regularly audit logs for unexpected changes.
  • If an upgrade cannot be performed promptly, isolate the affected module by restricting external access or disabling role modification endpoints until a patch is applied.

Generated by OpenCVE AI on March 23, 2026 at 20:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wwg8-6ffr-h4q2 Admidio is Missing CSRF Validation on Role Delete, Activate, and Deactivate Actions
History

Mon, 23 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Admidio
Admidio admidio
Vendors & Products Admidio
Admidio admidio

Thu, 19 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the delete, activate, and deactivate modes in modules/groups-roles/groups_roles.php perform destructive state changes on organizational roles but never validate an anti-CSRF token. The client-side UI passes a CSRF token to callUrlHideElement(), which includes it in the POST body, but the server-side handlers ignore $_POST["adm_csrf_token"] entirely for these three modes. An attacker who can discover a role UUID (visible in the public cards view when the module is publicly accessible) can embed a forged POST form on any external page and trick any user with the rol_assign_roles right into deleting or toggling roles for the organization. Role deletion is permanent and cascades to all memberships, event associations, and rights data. If exploited, an attacker can trick any user with delegated role-assignment rights into permanently deleting roles, mass-revoking all associated memberships and access to events, documents, and mailing lists, or silently activating or deactivating entire groups, with target role UUIDs trivially harvested from the unauthenticated public cards view and no undo path short of a database restore. This issue has been fixed in version 5.0.7.
Title Admidio has Missing CSRF Validation on Role Delete, Activate, and Deactivate Actions
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T17:29:42.359Z

Reserved: 2026-03-16T17:35:36.696Z

Link: CVE-2026-32816

cve-icon Vulnrichment

Updated: 2026-03-20T17:29:28.902Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T23:16:44.380

Modified: 2026-03-23T19:10:21.587

Link: CVE-2026-32816

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:10Z

Weaknesses