Description
Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the createBundle method in `csettings.cfc` does not properly validate anti-CSRF tokens for site bundle creation requests. An attacker can craft a malicious webpage or link that, when visited by a logged-in administrator, triggers the silent creation of a comprehensive site bundle. This bundle is saved to a predictable, publicly accessible web directory. An unauthenticated attacker can then retrieve the bundle and obtain site content, user account data, password hashes, form submissions, email lists, plugins, and configuration data. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, remove unexpected bundle files from public directories, restrict access to the affected endpoint, and limit exposure of administrative sessions.
Published: 2026-05-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw in Masa CMS’s site bundle creation routine. An attacker can force a logged‑in administrator to silently generate a complete site bundle without providing a valid anti‑CSRF token. The resulting bundle, which is written to a predictable location on the web server, is publicly readable. An unauthenticated attacker can download the bundle to obtain site content, user details, password hashes, form submissions, email lists, plugins, and configuration data. The weakness is identified as CWE‑352 and carries a CVSS score of 7.1. The EPSS score is not available, and the flaw is not listed in the CISA KEV catalog.

Affected Systems

MasaCMS versions 7.5.2 and earlier are affected. The fix is included in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. Administrators on older revisions with the expose‑public‑bundle feature enabled must update their installation to a fixed release or apply the workaround.

Risk and Exploitability

Because the attack can be triggered by a simple malicious link and only requires a logged‑in admin session, the risk is significant for systems running vulnerable versions. The flaw is not currently listed in KEV and lacks an EPSS entry, but the CVSS severity indicates substantive confidentiality loss. Attackers can exploit this by embedding the crafted request in an attacker‑controlled page or email, and only a single privileged session is required to create the exposed bundle. The combiformation of high confidentiality impact and ease of exploitation warrants urgent remediation.

Generated by OpenCVE AI on May 6, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Masa CMS to a version that includes the bundle‑creation patch (7.2.10 or later, including 7.5.3).
  • Configure the web server to deny public read access for the directory where site bundles are stored or move it outside the web root.
  • Disable or restrict the /csettings.cfc/createBundle endpoint for non‑administrator users or enforce CSRF token validation if available.

Generated by OpenCVE AI on May 6, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Masacms
Masacms masacms
Vendors & Products Masacms
Masacms masacms

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the createBundle method in `csettings.cfc` does not properly validate anti-CSRF tokens for site bundle creation requests. An attacker can craft a malicious webpage or link that, when visited by a logged-in administrator, triggers the silent creation of a comprehensive site bundle. This bundle is saved to a predictable, publicly accessible web directory. An unauthenticated attacker can then retrieve the bundle and obtain site content, user account data, password hashes, form submissions, email lists, plugins, and configuration data. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, remove unexpected bundle files from public directories, restrict access to the affected endpoint, and limit exposure of administrative sessions.
Title Masa CMS CSRF in site bundle creation allows unauthorized site data export
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-06T19:57:03.567Z

Reserved: 2026-04-10T21:41:54.505Z

Link: CVE-2026-40326

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-06T20:16:32.403

Modified: 2026-05-06T21:22:50.760

Link: CVE-2026-40326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T22:15:13Z

Weaknesses