Description
A weakness has been identified in SourceCodester Note Taking App up to 1.0. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Apply Patch
AI Analysis

Impact

The Note Taking App contains a function that can be misused to perform unauthorized changes without the user’s consent. An attacker can send a crafted request from a malicious website, causing the victim to unknowingly modify or delete information. This flaw aligns with CWE‑352 and CWE‑862, indicating missing CSRF protection and inadequate authorization checks, and threatens the integrity of user data.

Affected Systems

SourceCodester’s Note Taking App, version 1.0 and earlier, is affected. The unspecified function that enables note manipulation is part of the application’s core functionality, exposing all users running these releases to potential exploitation.

Risk and Exploitability

The CVSS score of 5.3 classifies the issue as medium severity. The exploit is publicly available and can be performed remotely by luring an authenticated user to visit a malicious page, which then sends the forged request to the app. Although the EPSS score is unavailable and the vulnerability is not listed in the KEV catalog, its remote nature and public exploits make it a realistic threat for environments that use the vulnerable version.

Generated by OpenCVE AI on March 28, 2026 at 06:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor patch or upgrade to the latest release of SourceCodester Note Taking App if available.
  • Implement CSRF token validation for all state‑changing requests and discard requests lacking a valid token.
  • Enforce strict authorization checks for sensitive operations so only authenticated users may execute them.
  • Monitor application logs for anomalous or repeated forged requests and investigate suspicious activity.

Generated by OpenCVE AI on March 28, 2026 at 06:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester note Taking App
Vendors & Products Sourcecodester
Sourcecodester note Taking App

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SourceCodester Note Taking App up to 1.0. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. If you want to get best quality of vulnerability data, you may have to visit VulDB. A weakness has been identified in SourceCodester Note Taking App up to 1.0. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

Fri, 27 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SourceCodester Note Taking App up to 1.0. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Title SourceCodester Note Taking App cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Note Taking App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T14:54:10.710Z

Reserved: 2026-03-27T08:52:57.705Z

Link: CVE-2026-4971

cve-icon Vulnrichment

Updated: 2026-03-30T13:14:58.177Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T20:16:37.780

Modified: 2026-03-30T13:26:07.647

Link: CVE-2026-4971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:00:49Z

Weaknesses