Home

Description

QuickCMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. An attacker can craft special website, which when visited by the victim, will automatically send a POST request with victim's privileges. This software does not implement any protection against this type of attack. All forms available in this software are potentially vulnerable. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2026-01-27 | Published 2026-03-06 | Updated 2026-03-06 | Assigner CERT-PL




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unknown

6.8 (semver)
affected

Credits

Michał Biesiada finder

References

cert.pl/posts/2026/03/CVE-2026-1468 third-party-advisory

opensolution.org/cms-system-quick-cms.html product

cve.org (CVE-2026-1468)

nvd.nist.gov (CVE-2026-1468)

Download JSON