
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross Site Request Forgery (CSRF) vulnerability was discovered in Express cart v1.1.16, affecting the application's administrative functions. The vulnerability was identified and assigned CVE-2020-22403. The issue allows attackers to perform unauthorized administrative actions including adding administrator accounts and discount codes (MITRE CVE).
The vulnerability exists because the API admin functionality only checks session parameters without implementing proper CSRF protections. The express-cart package through version 1.1.10 for Node.js is affected by this CSRF vulnerability. The severity is rated as HIGH with a CVSS v3.1 Base Score of 8.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) (NVD).
The vulnerability allows attackers to perform unauthorized administrative actions including creating administrator accounts and adding discount codes. This could lead to complete compromise of administrative functions and potential unauthorized access to the application (MITRE CVE, GitHub Issue).
Users should upgrade to a version newer than v1.1.16 that includes CSRF protections. The vulnerability was reported through GitHub issues and acknowledged by the project maintainers (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."