A vulnerability, which was classified as problematic, has been found in SeaCMS up to 13.2. Affected by this issue is some unknown functionality of the file /admin_type.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.314336 | vdb entry third party advisory |
https://vuldb.com/?ctiid.314336 | permissions required vdb entry signature |
https://vuldb.com/?submit.603562 | vdb entry third party advisory |
https://github.com/murongchengshu/zhicheng_tan/blob/main/SeaCMS_1.md | exploit |