Description
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.
Problem types
CWE-352: Cross-Site Request Forgery (CSRF)
Product status
References
github.com/...FluxCP/security/advisories/GHSA-5w2g-8cqq-r4fr
github.com/...ommit/e3f130c4a2ccd615a3ee2ee0302ecbfbd84747e6