Impact
An attacker can use cross‑site request forgery to manipulate SourceCodester Computer Laboratory Management System 1.0. The weakness stems from a lack of proper CSRF protection, allowing forged requests to be accepted by the server as if they originated from an authenticated user. As a result, attackers could perform unintended state‑changing operations such as modifying or deleting data, compromising data integrity and potentially exposing sensitive information. Based on the nature of CSRF, it is inferred that the victim must be logged in for the forged requests to succeed.
Affected Systems
The vulnerability affects the SourceCodester Computer Laboratory Management System, version 1.0. No other products or versions are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while an EPSS score of less than 1% suggests low exploitation probability up to now. The vulnerability is not in the CISA KEV catalog, and the exploit is thought to be remote. Attackers can exploit the flaw by crafting malicious requests and forcing a victim’s browser to execute them, with the server trusting their origin.
OpenCVE Enrichment