Cross-Site Request Forgery
Cross-Site Request Forgery (CSRF) vulnerabilities trick authenticated users into executing unwanted actions on a web application, potentially leading to unauthorized state changes.
23
MEDIUM
General
Understanding Cross-Site Request Forgery
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Cross-Site Request Forgery CVEs (23)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-22215 | 5.3 | This vulnerability allows attackers to send unauthorized requests that can reveal or change user follow relationships on wpDiscuz without proper security checks. To exploit this, the attacker needs to trick a logged-in user into clicking a malicious link while they are on the site. | gvectorswpdiscuz | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2026-22202 | 6.1 | This vulnerability allows attackers to permanently delete all comments linked to a specific email address by tricking users into clicking on a malicious link or image. It requires the attacker to have a valid HMAC key and can be exploited without any confirmation from the user, making it particularly dangerous. | gvectorswpdiscuz | Theoretical | 25 days agoMar 13, 2026 |
| CVE-2026-28281 | 7.1 | This vulnerability allows attackers to gain moderator privileges, execute tasks, delete posts, and accept friend requests on behalf of users without their consent. It occurs because the system fails to properly check security tokens, and it affects versions prior to 2.18.1, so upgrading is essential to protect against these risks. | instantcmsinstantcms | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2026-1508 | 4.3 | This vulnerability allows an attacker to trick a logged-in admin into accidentally deleting events from the Court Reservation WordPress plugin. The attacker can exploit this flaw without needing direct access to the admin account, as long as the admin visits a malicious link. | Unknown | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2026-29784 | 8.8 | This vulnerability allows an attacker to potentially take over a Ghost site by exploiting weak protections during the login process, making it easier for them to use stolen session tokens. It primarily affects versions 5.101.6 to 6.19.2, and users should upgrade to version 6.19.3 or later to fix the issue. | ghostghost | Exploit Available | about 1 month agoMar 7, 2026 |
| CVE-2018-25168 | 5.3 | This vulnerability allows attackers to create new administrative user accounts on the Precurio Intranet Portal without needing to log in or have any special permissions. They can do this by sending specially crafted requests to a specific part of the system, taking advantage of a lack of security checks. | Unknown | Exploit Available | about 1 month agoMar 6, 2026 |
| CVE-2026-3589 | 7.5 | This vulnerability allows an attacker to create new admin user accounts on a WooCommerce site without needing to log in, potentially giving them full control over the store. It can be exploited by anyone, as long as they can trick a logged-in admin into executing a malicious request. | Unknown | Exploit Available | about 1 month agoMar 6, 2026 |
| CVE-2026-30793 | 9.3 | An attacker can exploit a security flaw in the RustDesk Client to trick users into changing their passwords without their consent, potentially giving the attacker access to the user's account. This vulnerability affects versions up to 1.4.5 on multiple platforms, and it requires the attacker to get the user to click on a malicious link. | Unknown | Exploit Available | about 1 month agoMar 5, 2026 |
| CVE-2025-64166 | 5.4 | An attacker can exploit a flaw in Mercurius to perform unauthorized actions on behalf of an authenticated user by tricking their browser into sending a specially crafted request. This vulnerability occurs when the server incorrectly interprets certain types of requests, allowing the attacker to bypass security checks, but it only affects versions before 16.4.0. | Unknown | Theoretical | about 1 month agoMar 5, 2026 |
| CVE-2021-35486 | 8.1 | An attacker can exploit this vulnerability to remotely import and overwrite the entire configuration of the Nokia IMPACT application, potentially taking full control of it. This can happen because the application fails to check for a security token that normally helps prevent unauthorized actions, allowing the attacker to execute this without needing to be authenticated. | Unknown | Theoretical | about 1 month agoMar 3, 2026 |
| CVE-2025-58405 | 5.3 | An attacker can trick users into interacting with the CGM CLININET application by embedding it in a hidden frame on a malicious website, potentially leading users to perform unintended actions without their knowledge. This vulnerability exists because the application lacks protections against clickjacking, meaning it doesn't have the necessary security measures in place to prevent such attacks. | Unknown | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2026-27513 | 5.1 | An attacker can trick an authenticated administrator of the Tenda F3 router into making unwanted changes to the router's settings through its web interface. This vulnerability occurs because the router does not have protections in place to prevent such attacks, meaning the administrator must be logged in for the attack to succeed. | tendaf3 firmware | Theoretical | about 1 month agoFeb 23, 2026 |
| CVE-2024-55271 | 3.5 | An attacker can trick a logged-in user of the gym management system into unknowingly updating their profile information by sending them a malicious link. This vulnerability requires the user to be logged in and click on the link while visiting the attacker's site, potentially allowing the attacker to change the user's details without their consent. | phpgurukulgym management system | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2024-37212 | 8.8 | This vulnerability allows an attacker to trick users into performing actions on the Ali2Woo Lite platform without their consent, potentially leading to unauthorized changes or data exposure. It affects versions up to 3.3.5 and requires the user to be logged in to the site while the attacker sends a malicious request. | ali2wooaliexpress dropshipping with alinext | Theoretical | almost 2 years agoJun 21, 2024 |
| CVE-2023-41654 | 8.8 | This vulnerability allows an attacker to trick a user into performing actions on the authLdap plugin without their consent, potentially compromising user accounts. It requires the user to be logged in and to click on a malicious link or visit a malicious site while using the affected plugin version. | heiglandreasauthldap | Theoretical | over 2 years agoOct 6, 2023 |
| CVE-2023-32625 | 4.3 | This vulnerability allows an attacker to take control of a user's account and change their settings by tricking them into visiting a malicious webpage. The attacker does not need to be logged in, but the user must be authenticated and visit the harmful page while logged into the affected application. | sakurats webfonts for sakura | Theoretical | over 2 years agoJul 21, 2023 |
| CVE-2023-36517 | 8.8 | This vulnerability allows an attacker to trick a user into performing actions on their WordPress site without their consent, potentially leading to unauthorized changes or data exposure. It requires the user to be logged into their account and to click on a malicious link while visiting a compromised website. | kevonadoniswp abstracts | Exploit Available | over 2 years agoJul 11, 2023 |
| CVE-2023-2533 | 8.8 | An attacker can trick an admin user into clicking a malicious link, which could allow them to change security settings or run harmful code on the PaperCut system. This vulnerability only works if the admin is logged in at the time of the attack. | papercutpapercut mf | Exploit Available | almost 3 years agoJun 20, 2023 |
| CVE-2023-2307 | 6.5 | This vulnerability allows an attacker to trick a user into performing unwanted actions on a website using the qwik framework, potentially compromising their account or data. It affects versions prior to 0.104.0 and requires the user to be logged in while visiting a malicious site. | qwikqwik | Exploit Available | almost 3 years agoApr 26, 2023 |
| CVE-2022-0088 | 7.4 | This vulnerability allows an attacker to trick a logged-in user of the YOURLS URL shortening service into performing unwanted actions without their consent, potentially leading to unauthorized changes or data exposure. The attacker needs to get the user to click on a malicious link while they are logged into the service. | yourlsyourls | Exploit Available | about 4 years agoApr 3, 2022 |