Vulnerabilities (CVE)

Filtered by CWE-352
Total 7935 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-23902 1 Jenkins 1 Github Branch Source 2025-05-30 N/A 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.
CVE-2024-1747 1 Vanquish 1 Woocommerce Customers Manager 2025-05-29 N/A 6.5 MEDIUM
The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values.
CVE-2024-2843 1 Vanquish 1 Woocommerce Customers Manager 2025-05-29 N/A 6.5 MEDIUM
The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some places, which could allow attackers to make logged in admin users delete users via CSRF attacks
CVE-2024-3983 1 Vanquish 1 Woocommerce Customers Manager 2025-05-29 N/A 8.1 HIGH
The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks
CVE-2023-6391 1 Jeremiahorem 1 Custom User Css 2025-05-29 N/A 8.8 HIGH
The Custom User CSS WordPress plugin through 0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
CVE-2024-41602 1 Denkgroot 1 Spina 2025-05-29 N/A 8.8 HIGH
Cross Site Request Forgery vulnerability in Spina CMS v.2.18.0 and before allows a remote attacker to escalate privileges via a crafted URL
CVE-2024-41603 1 Denkgroot 1 Spina 2025-05-29 N/A 9.6 CRITICAL
Spina CMS v2.18.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the URI /admin/layout.
CVE-2024-22859 1 Laravel 1 Livewire 2025-05-29 N/A 8.8 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in livewire before v3.0.4, allows remote attackers to execute arbitrary code getCsrfToken function. NOTE: the vendor disputes this because the 5d88731 commit fixes a usability problem (HTTP 419 status codes for legitimate client activity), not a security problem.
CVE-2022-35196 1 Testlink 1 Testlink 2025-05-29 N/A 8.8 HIGH
TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.
CVE-2024-50966 1 Timgreen 1 Dingfanzu Cms 2025-05-28 N/A 9.3 CRITICAL
dingfanzu CMS V1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/doAdminAction.php?act=addAdmin.
CVE-2025-1813 1 Zframeworks 1 Zz 2025-05-28 5.0 MEDIUM 4.3 MEDIUM
A vulnerability classified as problematic was found in zj1983 zz up to 2024-08. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-25808 1 Lycheeorg 1 Lychee 2025-05-28 N/A 8.3 HIGH
Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function.
CVE-2024-12115 1 Ays-pro 1 Poll Maker 2025-05-28 N/A 4.3 MEDIUM
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.4. This is due to missing or incorrect nonce validation on the duplicate_poll() function. This makes it possible for unauthenticated attackers to duplicate polls via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-48418 1 Edimax 2 Br-6476ac, Br-6476ac Firmware 2025-05-28 N/A 8.8 HIGH
In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request /goform/fromSetDDNS does not properly handle special characters in any of user provided parameters, allowing an attacker with access to the web interface to inject and execute arbitrary shell commands.
CVE-2022-41227 1 Jenkins 1 Ns-nd Integration Performance Publisher 2025-05-28 N/A 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials.
CVE-2024-9709 1 Lukashuser 1 Ekc Tournament Manager 2025-05-28 N/A 5.4 MEDIUM
The EKC Tournament Manager WordPress plugin before 2.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
CVE-2024-9711 1 Lukashuser 1 Ekc Tournament Manager 2025-05-28 N/A 5.4 MEDIUM
The EKC Tournament Manager WordPress plugin before 2.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
CVE-2022-41253 1 Jenkins 1 Cons3rt 2025-05-28 N/A 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins CONS3RT Plugin 1.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2022-41245 1 Jenkins 1 Worksoft Execution Manager 2025-05-28 N/A 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2022-41236 1 Jenkins 1 Security Inspector 2025-05-28 N/A 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins Security Inspector Plugin 117.v6eecc36919c2 and earlier allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the .../report URL with a report based on attacker-specified report generation options.