CVE-2022-0088

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to trick a logged-in user of the YOURLS URL shortening service into performing unwanted actions without their consent, potentially leading to unauthorized changes or data exposure. The attacker needs to get the user to click on a malicious link while they are logged into the service.

Technical Description

Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,842($1K-$5K)
Vendor Response
Grade FPatched in 1415 days

Quick Information

Published

Apr 3, 2022

almost 4 years ago

Last Modified

Feb 16, 2026

4 days ago

Vendor

yourls

Product

yourls