Vulnerability Description
Admidio is an open-source user management solution. Prior to version 5.0.8, the create_user, assign_member, and assign_user action modes in modules/registration.php approve pending user registrations via GET request without validating a CSRF token. Unlike the delete_user mode in the same file (which correctly validates the token), these three approval actions read their parameters from $_GET and perform irreversible state changes without any protection. An attacker who has submitted a pending registration can extract their own user UUID from the registration confirmation email URL, then trick any user with the rol_approve_users right into visiting a crafted URL that automatically approves the registration. This bypasses the manual registration approval workflow entirely. This issue has been patched in version 5.0.8.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Admidio | Admidio | < 5.0.8 |
Related Weaknesses (CWE)
References
- https://github.com/Admidio/admidio/commit/707171c188b3e8f36007fc3f2bccbfac896ed0Patch
- https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22ExploitMitigationVendor Advisory
- https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-34384?
CVE-2026-34384 is a vulnerability with a CVSS score of 4.5 (MEDIUM). Admidio is an open-source user management solution. Prior to version 5.0.8, the create_user, assign_member, and assign_user action modes in modules/registration.php approve pending user registrations ...
How severe is CVE-2026-34384?
CVE-2026-34384 has been rated MEDIUM with a CVSS base score of 4.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34384?
Check the references section above for vendor advisories and patch information. Affected products include: Admidio Admidio.