Impact
The vulnerability resides in the diary.php file of SourceCodester Diary App 1.0. An attacker can trigger a cross‑site request forgery that causes the server to execute state‑changing operations on behalf of a victim. Because the request is performed through the unknown function in diary.php, an attacker can perform actions such as creating, editing or deleting diary entries. This constitutes a CSRF weakness (CWE‑352) and also reflects missing access control (CWE‑862).
Affected Systems
Only SourceCodester Diary App 1.0 is listed as affected. No other versions or variants are mentioned and the CNA supplied no detailed version ranges. The vulnerability originates from the diary.php component in that specific release.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. EPSS is not available but the issue has been publicly disclosed and can be exploited by sending a crafted request to the server. Because the exploit can be launched remotely without authentication, the risk is significant for sites exposing the Diary App to the Internet. The vulnerability is not included in CISA’s KEV catalog.
OpenCVE Enrichment