CVE-2023-2533

Plain English Summary

AI-powered analysis for quick understanding

An attacker can trick an admin user into clicking a malicious link, which could allow them to change security settings or run harmful code on the PaperCut system. This vulnerability only works if the admin is logged in at the time of the attack.

Technical Description

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 981 days

Quick Information

Published

Jun 20, 2023

almost 3 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

papercut

Product

papercut mf