Home

Description

Easy2Pilot 7 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the admin.php?action=add_user endpoint with POST requests containing username and password parameters to create new administrative accounts without explicit user consent.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-13 | Updated 2026-05-13 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

7
affected

Credits

indoushka finder

References

www.exploit-db.com/exploits/48099 (ExploitDB-48099) exploit

easy2pilot-v7.com/ (Official Product Homepage) product

www.vulncheck.com/...ross-site-request-forgery-via-admin-php (VulnCheck Advisory: Easy2Pilot 7 Cross-Site Request Forgery via admin.php) third-party-advisory

cve.org (CVE-2020-37217)

nvd.nist.gov (CVE-2020-37217)

Download JSON