Home

Description

Zucchetti Axess CLOKI Access Control 1.64 contains a cross-site request forgery vulnerability that allows attackers to manipulate access control settings without user interaction. Attackers can craft malicious web pages with hidden forms to disable or modify access control parameters by tricking authenticated users into loading the page.

PUBLISHED Reserved 2025-12-07 | Published 2025-12-23 | Updated 2025-12-23 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

1.64
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/50595 (ExploitDB-50595) exploit

www.axesstmc.com (Product Web Page) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5689.php (Zero Science Lab Disclosure (ZSL-2021-5689)) third-party-advisory

www.vulncheck.com/...cess-control-cross-site-request-forgery (VulnCheck Advisory: Zucchetti Axess CLOKI Access Control 1.64 Cross-Site Request Forgery) third-party-advisory

cve.org (CVE-2021-47722)

nvd.nist.gov (CVE-2021-47722)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.