Description
Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the cTrash.empty function does not validate anti-CSRF tokens for trash management requests. An attacker can induce a logged-in administrator to submit a forged request that empties the trash and permanently deletes all deleted content. This can cause irreversible data loss and disrupt recovery of content intended for restoration. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, restrict access to the administrative backend, use browser isolation for administrative sessions, and maintain current database backups to recover from unauthorized deletion.
Published: 2026-05-06
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery flaw in Masa CMS’s trash‑emptying function allows an attacker to trick an authenticated administrator into permanently removing all items in the trash. The exploit bypasses the anti‑CSRF check, leading to irreversible data loss and preventing the recovery of items that the administrator intended to restore.

Affected Systems

The vulnerability affects MasaCMS MasaCMS versions 7.5.2 and earlier. Upgrades to 7.2.10, 7.3.15, 7.4.10, or 7.5.3 and later resolve the flaw.

Risk and Exploitability

With a CVSS score of 7.2, the flaw presents a moderate to high risk. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting that while exploitation is certainly possible, it may not yet be widely observed. Attackers would need to obtain a session with administrative privileges, which is typically achieved by social engineering or other foothold methods. Once the session is achieved, no additional privileges or complex conditions are required to trigger the deletion.

Generated by OpenCVE AI on May 6, 2026 at 21:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update MasaCMS to the latest patched version (7.2.10, 7.3.15, 7.4.10, or 7.5.3).
  • Restrict access to the administrative backend to trusted users or IP addresses.
  • Use browser isolation for administrative sessions to reduce the impact of credential compromise.
  • Maintain up‑to‑date database backups to enable rapid recovery of permanently deleted content.

Generated by OpenCVE AI on May 6, 2026 at 21:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Masacms
Masacms masacms
Vendors & Products Masacms
Masacms masacms

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the cTrash.empty function does not validate anti-CSRF tokens for trash management requests. An attacker can induce a logged-in administrator to submit a forged request that empties the trash and permanently deletes all deleted content. This can cause irreversible data loss and disrupt recovery of content intended for restoration. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, restrict access to the administrative backend, use browser isolation for administrative sessions, and maintain current database backups to recover from unauthorized deletion.
Title Masa CMS CSRF in trash management allows unauthorized permanent deletion of deleted content
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-06T19:42:23.704Z

Reserved: 2026-04-10T21:41:54.504Z

Link: CVE-2026-40309

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-06T20:16:32.137

Modified: 2026-05-06T21:22:50.760

Link: CVE-2026-40309

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T22:30:13Z

Weaknesses