Home

Description

Redaxo CMS 5.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the users endpoint with hidden fields containing admin credentials and account parameters to add new administrator accounts without user consent.

PUBLISHED Reserved 2026-04-04 | Published 2026-04-04 | Updated 2026-04-06 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

5.2
affected

Credits

Ashiyane Digital Security Team finder

References

www.exploit-db.com/exploits/40708 (ExploitDB-40708) exploit

www.vulncheck.com/...site-request-forgery-via-users-endpoint (VulnCheck Advisory: Redaxo CMS 5.2 Cross-Site Request Forgery via users endpoint) third-party-advisory

cve.org (CVE-2016-20053)

nvd.nist.gov (CVE-2016-20053)

Download JSON