Home

Description

Qool CMS 2.0 RC2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious web pages. Attackers can forge POST requests to the /admin/adduser endpoint with parameters like username, password, email, and level to create root-level user accounts without user consent.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2.0
affected

References

www.exploit-db.com/exploits/24627 (ExploitDB-24627) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5134.php (Vulnerability Advisory) vendor-advisory

www.vulncheck.com/...-cross-site-request-forgery-via-adduser (VulnCheck Advisory: Qool CMS 2.0 RC2 Cross-Site Request Forgery via adduser) third-party-advisory

cve.org (CVE-2013-20005)

nvd.nist.gov (CVE-2013-20005)

Download JSON