Description
A vulnerability was determined in SourceCodester Diary App 1.0. The affected element is an unknown function of the file diary.php. Executing a manipulation can lead to cross-site request forgery. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Cross‑Site Request Forgery leading to unauthorized diary data manipulation
Action: Patch Now
AI Analysis

Impact

A function within diary.php of SourceCodester Diary App 1.0 accepts malicious input that can be used to perform a cross‑site request forgery. The flaw allows an attacker to send a crafted request on behalf of a legitimate user, potentially creating, editing, or deleting diary entries without the user’s consent. The official description identifies the weakness as a CSRF (CWE‑352) and a missing authentication check (CWE‑862). No mention is made of remote code execution; the impact is limited to unauthorized manipulation of diary data.

Affected Systems

The application affected is SourceCodester Diary App version 1.0. The weakness resides in the diary.php script. No other versions or products are listed in the CVE data, so only this instance is impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available and the vulnerability is not in CISA’s KEV list. The exploit can be triggered remotely by submitting a forged HTTP request; it typically requires the victim to be authenticated, but the description does not explicitly state this. Given the lack of a publicly available patch, the risk remains present until a fix is deployed or mitigation measures are applied.

Generated by OpenCVE AI on March 27, 2026 at 19:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check SourceCodester’s website for an updated release that fixes the CSRF issue and apply the patch
  • If a patched version is not yet available, modify diary.php to generate and validate a CSRF token for each request
  • Enforce same‑origin requests by setting the SameSite attribute on session cookies or by performing a referer check
  • Monitor user accounts for anomalous activity and consider temporarily blocking accounts until the vulnerability is mitigated

Generated by OpenCVE AI on March 27, 2026 at 19:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in SourceCodester Diary App 1.0. The affected element is an unknown function of the file diary.php. Executing a manipulation can lead to cross-site request forgery. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Title SourceCodester Diary App diary.php cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T18:06:17.401Z

Reserved: 2026-03-27T08:49:30.118Z

Link: CVE-2026-4968

cve-icon Vulnrichment

Updated: 2026-03-27T18:05:31.447Z

cve-icon NVD

Status : Received

Published: 2026-03-27T18:16:07.030

Modified: 2026-03-27T18:16:07.030

Link: CVE-2026-4968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:27:54Z

Weaknesses