CVE-2023-2533
Plain English Summary
AI-powered analysis for quick understanding
An attacker can trick an admin user into clicking a malicious link, which could allow them to change security settings or run harmful code on the PaperCut system. This vulnerability only works if the admin is logged in at the time of the attack.
Technical Description
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jun 20, 2023
almost 3 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
papercut
Product
papercut mf