Vulnerability Description
PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/addons/uninstall/anomaly.module.blocks URI: an arbitrary plugin will be deleted.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyrocms | Pyrocms | 3.7 |
Related Weaknesses (CWE)
References
- https://gist.github.com/farid007/df51b0666643ec01d5571cbcc1e966e7ExploitThird Party Advisory
- https://github.com/pyrocms/pyrocmsThird Party Advisory
- https://pyrocms.com/Product
- https://gist.github.com/farid007/df51b0666643ec01d5571cbcc1e966e7ExploitThird Party Advisory
- https://github.com/pyrocms/pyrocmsThird Party Advisory
- https://pyrocms.com/Product
FAQ
What is CVE-2020-25263?
CVE-2020-25263 is a vulnerability with a CVSS score of 7.1 (HIGH). PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/addons/uninstall/anomaly.module.blocks URI: an arbitrary plugin will be deleted.
How severe is CVE-2020-25263?
CVE-2020-25263 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25263?
Check the references section above for vendor advisories and patch information. Affected products include: Pyrocms Pyrocms.