CVE-2022-0088
High
|7.4Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to trick a logged-in user of the YOURLS URL shortening service into performing unwanted actions without their consent, potentially leading to unauthorized changes or data exposure. The attacker needs to get the user to click on a malicious link while they are logged into the service.
Technical Description
Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactNone
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$1,842($1K-$5K)
Vendor Response
Grade FPatched in 1415 days
Quick Information
Published
Apr 3, 2022
almost 4 years ago
Last Modified
Feb 16, 2026
4 days ago
Vendor
yourls
Product
yourls