Cross-Site Request Forgery

Cross-Site Request Forgery (CSRF) vulnerabilities trick authenticated users into executing unwanted actions on a web application, potentially leading to unauthorized state changes.

Total CVEs

23

Typical Severity

MEDIUM

Category

General

Understanding Cross-Site Request Forgery

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Cross-Site Request Forgery CVEs (23)

DescriptionVendor / ProductExploit Status
CVE-2026-222155.3

This vulnerability allows attackers to send unauthorized requests that can reveal or change user follow relationships on wpDiscuz without proper security checks. To exploit this, the attacker needs to trick a logged-in user into clicking a malicious link while they are on the site.

gvectorswpdiscuz
Exploit Available
25 days agoMar 13, 2026
CVE-2026-222026.1

This vulnerability allows attackers to permanently delete all comments linked to a specific email address by tricking users into clicking on a malicious link or image. It requires the attacker to have a valid HMAC key and can be exploited without any confirmation from the user, making it particularly dangerous.

gvectorswpdiscuz
Theoretical
25 days agoMar 13, 2026
CVE-2026-282817.1

This vulnerability allows attackers to gain moderator privileges, execute tasks, delete posts, and accept friend requests on behalf of users without their consent. It occurs because the system fails to properly check security tokens, and it affects versions prior to 2.18.1, so upgrading is essential to protect against these risks.

instantcmsinstantcms
Exploit Available
28 days agoMar 10, 2026
CVE-2026-15084.3

This vulnerability allows an attacker to trick a logged-in admin into accidentally deleting events from the Court Reservation WordPress plugin. The attacker can exploit this flaw without needing direct access to the admin account, as long as the admin visits a malicious link.

Unknown
Exploit Available
28 days agoMar 10, 2026
CVE-2026-297848.8

This vulnerability allows an attacker to potentially take over a Ghost site by exploiting weak protections during the login process, making it easier for them to use stolen session tokens. It primarily affects versions 5.101.6 to 6.19.2, and users should upgrade to version 6.19.3 or later to fix the issue.

ghostghost
Exploit Available
about 1 month agoMar 7, 2026
CVE-2018-251685.3

This vulnerability allows attackers to create new administrative user accounts on the Precurio Intranet Portal without needing to log in or have any special permissions. They can do this by sending specially crafted requests to a specific part of the system, taking advantage of a lack of security checks.

Unknown
Exploit Available
about 1 month agoMar 6, 2026
CVE-2026-35897.5

This vulnerability allows an attacker to create new admin user accounts on a WooCommerce site without needing to log in, potentially giving them full control over the store. It can be exploited by anyone, as long as they can trick a logged-in admin into executing a malicious request.

Unknown
Exploit Available
about 1 month agoMar 6, 2026
CVE-2026-307939.3

An attacker can exploit a security flaw in the RustDesk Client to trick users into changing their passwords without their consent, potentially giving the attacker access to the user's account. This vulnerability affects versions up to 1.4.5 on multiple platforms, and it requires the attacker to get the user to click on a malicious link.

Unknown
Exploit Available
about 1 month agoMar 5, 2026
CVE-2025-641665.4

An attacker can exploit a flaw in Mercurius to perform unauthorized actions on behalf of an authenticated user by tricking their browser into sending a specially crafted request. This vulnerability occurs when the server incorrectly interprets certain types of requests, allowing the attacker to bypass security checks, but it only affects versions before 16.4.0.

Unknown
Theoretical
about 1 month agoMar 5, 2026
CVE-2021-354868.1

An attacker can exploit this vulnerability to remotely import and overwrite the entire configuration of the Nokia IMPACT application, potentially taking full control of it. This can happen because the application fails to check for a security token that normally helps prevent unauthorized actions, allowing the attacker to execute this without needing to be authenticated.

Unknown
Theoretical
about 1 month agoMar 3, 2026
CVE-2025-584055.3

An attacker can trick users into interacting with the CGM CLININET application by embedding it in a hidden frame on a malicious website, potentially leading users to perform unintended actions without their knowledge. This vulnerability exists because the application lacks protections against clickjacking, meaning it doesn't have the necessary security measures in place to prevent such attacks.

Unknown
Theoretical
about 1 month agoMar 2, 2026
CVE-2026-275135.1

An attacker can trick an authenticated administrator of the Tenda F3 router into making unwanted changes to the router's settings through its web interface. This vulnerability occurs because the router does not have protections in place to prevent such attacks, meaning the administrator must be logged in for the attack to succeed.

tendaf3 firmware
Theoretical
about 1 month agoFeb 23, 2026
CVE-2024-552713.5

An attacker can trick a logged-in user of the gym management system into unknowingly updating their profile information by sending them a malicious link. This vulnerability requires the user to be logged in and click on the link while visiting the attacker's site, potentially allowing the attacker to change the user's details without their consent.

phpgurukulgym management system
Exploit Available
about 2 months agoFeb 17, 2026
CVE-2024-372128.8

This vulnerability allows an attacker to trick users into performing actions on the Ali2Woo Lite platform without their consent, potentially leading to unauthorized changes or data exposure. It affects versions up to 3.3.5 and requires the user to be logged in to the site while the attacker sends a malicious request.

ali2wooaliexpress dropshipping with alinext
Theoretical
almost 2 years agoJun 21, 2024
CVE-2023-416548.8

This vulnerability allows an attacker to trick a user into performing actions on the authLdap plugin without their consent, potentially compromising user accounts. It requires the user to be logged in and to click on a malicious link or visit a malicious site while using the affected plugin version.

heiglandreasauthldap
Theoretical
over 2 years agoOct 6, 2023
CVE-2023-326254.3

This vulnerability allows an attacker to take control of a user's account and change their settings by tricking them into visiting a malicious webpage. The attacker does not need to be logged in, but the user must be authenticated and visit the harmful page while logged into the affected application.

sakurats webfonts for sakura
Theoretical
over 2 years agoJul 21, 2023
CVE-2023-365178.8

This vulnerability allows an attacker to trick a user into performing actions on their WordPress site without their consent, potentially leading to unauthorized changes or data exposure. It requires the user to be logged into their account and to click on a malicious link while visiting a compromised website.

kevonadoniswp abstracts
Exploit Available
over 2 years agoJul 11, 2023
CVE-2023-25338.8

An attacker can trick an admin user into clicking a malicious link, which could allow them to change security settings or run harmful code on the PaperCut system. This vulnerability only works if the admin is logged in at the time of the attack.

papercutpapercut mf
Exploit Available
almost 3 years agoJun 20, 2023
CVE-2023-23076.5

This vulnerability allows an attacker to trick a user into performing unwanted actions on a website using the qwik framework, potentially compromising their account or data. It affects versions prior to 0.104.0 and requires the user to be logged in while visiting a malicious site.

qwikqwik
Exploit Available
almost 3 years agoApr 26, 2023
CVE-2022-00887.4

This vulnerability allows an attacker to trick a logged-in user of the YOURLS URL shortening service into performing unwanted actions without their consent, potentially leading to unauthorized changes or data exposure. The attacker needs to get the user to click on a malicious link while they are logged into the service.

yourlsyourls
Exploit Available
about 4 years agoApr 3, 2022
Showing 1 to 20 of 23 results