First published: Mon Jan 06 2025(Updated: )
Grocy through 4.3.0 has no CSRF protection, as demonstrated by changing the Administrator's password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grocy | <=4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55076 is considered a high severity vulnerability due to the lack of CSRF protection allowing unauthorized password changes.
To fix CVE-2024-55076, update Grocy to version 4.3.1 or later, where CSRF protection is implemented.
CVE-2024-55076 allows attackers to change the Administrator's password without authentication, compromising the system's integrity.
No, CVE-2024-55076 can be mitigated by upgrading to Grocy version 4.3.1 or above.
Check the installed version of Grocy; if it is 4.3.0 or earlier, it is vulnerable to CVE-2024-55076.