A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-password-ajax-1 of the component Password Change Handler. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.306315 | third party advisory vdb entry |
https://vuldb.com/?ctiid.306315 | signature vdb entry permissions required |
https://vuldb.com/?submit.557787 | third party advisory vdb entry |
https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_3.md | exploit |