First published: Mon Sep 25 2023(Updated: )
A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seacms Seacms | <=12.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this CSRF vulnerability in Seacms is CVE-2023-43278.
The severity level of CVE-2023-43278 is high (8.8).
The CSRF vulnerability in Seacms up to v12.8 occurs in the admin_manager.php file and allows attackers to arbitrarily add an admin account.
The Common Weakness Enumeration (CWE) ID associated with CVE-2023-43278 is CWE-352.
Yes, you can find more information about this CSRF vulnerability in Seacms at the following references: [http://seacms.com](http://seacms.com), [https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501](https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501), [https://www.seacms.net/](https://www.seacms.net/).