Vulnerability Description
A vulnerability, which was classified as problematic, was found in zhenfeng13 My-Blog. Affected is an unknown function of the file /admin/configurations/userInfo. The manipulation of the argument yourAvatar/yourName/yourEmail leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-225264.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| My-Blog Project | My-Blog | - |
Related Weaknesses (CWE)
References
- https://gitee.com/zhenfeng13/My-Blog/issues/I6PV4UExploitIssue Tracking
- https://vuldb.com/?ctiid.225264Permissions Required
- https://vuldb.com/?id.225264Third Party Advisory
- https://gitee.com/zhenfeng13/My-Blog/issues/I6PV4UExploitIssue Tracking
- https://vuldb.com/?ctiid.225264Permissions Required
- https://vuldb.com/?id.225264Third Party Advisory
FAQ
What is CVE-2023-1937?
CVE-2023-1937 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability, which was classified as problematic, was found in zhenfeng13 My-Blog. Affected is an unknown function of the file /admin/configurations/userInfo. The manipulation of the argument your...
How severe is CVE-2023-1937?
CVE-2023-1937 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1937?
Check the references section above for vendor advisories and patch information. Affected products include: My-Blog Project My-Blog.