Home

Description

bloofoxCMS 0.5.2.1 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious pages. Attackers can craft hidden forms targeting the admin user creation endpoint to add new administrative accounts with arbitrary credentials without requiring explicit user consent.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-16 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

0.5.1.0 (semver)
affected

Credits

LiPeiYi finder

References

www.exploit-db.com/exploits/49507 (ExploitDB-49507) exploit

www.bloofox.com/ (Official Product Homepage) product

github.com/alexlang24/bloofoxCMS/releases/tag/0.5.2.1 (Product Reference) product

www.vulncheck.com/...cross-site-request-forgery-via-user-add (VulnCheck Advisory: bloofoxCMS 0.5.2.1 Cross-Site Request Forgery via user add) third-party-advisory

cve.org (CVE-2020-37241)

nvd.nist.gov (CVE-2020-37241)

Download JSON