CSRF token bypass in GeniXCMS before 1.0.2 could result in escalation of privileges. The forgotpassword.php page can be used to acquire a token.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/semplon/GeniXCMS/issues/70 | issue tracking third party advisory patch |
https://github.com/semplon/GeniXCMS/releases/tag/v1.0.2 | issue tracking third party advisory patch |