
Cloud Vulnerability DB
A community-led vulnerabilities database
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Automad CMS versions up to 1.10.9. The vulnerability affects the User Creation Handler component, specifically in the processing of the file '/dashboard?controller=UserCollection::createUser'. This security issue was disclosed publicly, and the vendor was contacted but did not respond to the disclosure (NVD).
The vulnerability has been rated as problematic with a CVSS v3.1 base score of 6.5 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N. The issue stems from the application's failure to implement CSRF tokens by default in user management functions. The vulnerability specifically affects the user creation and deletion endpoints through the dashboard controller (GitHub_Exploit).
If exploited, this vulnerability allows remote attackers to perform unauthorized actions on behalf of authenticated users. The primary impact is on the integrity of the system, particularly affecting user management functions such as user creation and deletion, without any direct impact on confidentiality or availability (NVD).
Users should upgrade to a version newer than Automad 1.10.9 if available. Since the vendor has not responded to the disclosure, implementing general CSRF protection measures such as implementing CSRF tokens, checking referrer headers, and using same-site cookie attributes may help mitigate the risk (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."