In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Piranha_cms | Dotnetfoundation | 4.0.1 (including) | 9.2 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0 (including) | 4.0.0 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha1 (including) | 4.0.0-alpha1 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha3 (including) | 4.0.0-alpha3 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha4 (including) | 4.0.0-alpha4 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha5 (including) | 4.0.0-alpha5 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha6 (including) | 4.0.0-alpha6 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha7 (including) | 4.0.0-alpha7 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha8 (including) | 4.0.0-alpha8 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-alpha9 (including) | 4.0.0-alpha9 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-beta1 (including) | 4.0.0-beta1 (including) |
Piranha_cms | Dotnetfoundation | 4.0.0-rc1 (including) | 4.0.0-rc1 (including) |