CVE-2026-2658
Received Received - Intake
Cross-Site Request Forgery in newbee-mall Multiple Endpoints

Publication date: 2026-02-18

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in newbee-ltd newbee-mall up to a069069b07027613bf0e7f571736be86f431faee. Affected is an unknown function of the component Multiple Endpoints. Performing a manipulation results in cross-site request forgery. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
newbee-ltd newbee-mall to a069069b07027613bf0e7f571736be86f431faee (inc)
newbee-ltd newbee-mall 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2658 is a Cross-Site Request Forgery (CSRF) vulnerability affecting multiple endpoints in the newbee-ltd newbee-mall version 1.0 application. The vulnerability arises because critical endpoints lack CSRF protection mechanisms such as token validation, allowing attackers to trick authenticated users into submitting unauthorized requests.'}, {'type': 'paragraph', 'content': "Specifically, endpoints like personal information update (/personal/updateInfo), order creation (/saveOrder), order completion (/orders/{orderNo}/finish), shopping cart operations (add, update, delete), admin profile updates, and carousel management are vulnerable. Attackers can exploit these flaws by crafting malicious web pages that silently send forged requests using the victim's authenticated session cookies."}, {'type': 'paragraph', 'content': 'This enables attackers to perform unauthorized actions such as modifying user personal data, hijacking deliveries, placing unauthorized orders, prematurely completing or canceling orders, manipulating shopping carts, and altering admin account information or homepage content without user consent.'}] [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13]


How can this vulnerability impact me? :

This vulnerability can have significant negative impacts including unauthorized modification of personal user information, such as shipping addresses, which can lead to hijacked deliveries and theft.

Attackers can force users to place unauthorized orders, prematurely complete or cancel orders, or fraudulently confirm payments, resulting in financial loss and disruption of legitimate transactions.

Shopping cart manipulation allows attackers to add, update, or delete items without user consent, causing inconvenience and potential financial damage.

On the administrative side, attackers can modify administrator profile information or homepage carousel content, enabling social engineering, phishing attacks, homepage defacement, and undermining system integrity and trust.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'The vulnerability CVE-2026-2658 affects multiple endpoints in the newbee-ltd newbee-mall application, all lacking CSRF token validation. Detection involves monitoring for unauthorized or suspicious POST, PUT, or DELETE requests to specific vulnerable endpoints while authenticated sessions are active.'}, {'type': 'paragraph', 'content': 'Suggested detection methods include:'}, {'type': 'list_item', 'content': 'Monitor HTTP requests to endpoints such as `/personal/updateInfo`, `/orders/{orderNo}/finish`, `/paySuccess`, `/admin/profile/name`, `/shop-cart`, `/orders/{orderNo}/cancel`, `/saveOrder`, and admin carousel management endpoints for unexpected or unauthorized state-changing requests.'}, {'type': 'list_item', 'content': 'Look for unusual HTTP methods (POST, PUT, DELETE, GET used improperly) on these endpoints from external or untrusted sources.'}, {'type': 'list_item', 'content': 'Check web server or application logs for repeated or automated requests with session cookies included, especially those that change user data or order states.'}, {'type': 'paragraph', 'content': 'While no explicit detection commands are provided in the resources, network administrators can use tools like `tcpdump` or `Wireshark` to capture HTTP traffic and filter for requests to the vulnerable endpoints. For example, using `tcpdump` to filter HTTP POST requests to `/personal/updateInfo` might look like:'}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '/personal/updateInfo'"}, {'type': 'paragraph', 'content': 'Similarly, web application firewalls (WAFs) or intrusion detection systems (IDS) can be configured to alert on state-changing requests to these endpoints without accompanying CSRF tokens or originating from suspicious sources.'}] [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps for CVE-2026-2658 focus on preventing exploitation of the CSRF vulnerabilities across multiple endpoints in the newbee-mall application.

  • Implement CSRF protection mechanisms such as synchronizer tokens or double-submit cookies on all state-changing endpoints, including `/personal/updateInfo`, `/orders/**`, `/paySuccess`, `/admin/profile/name`, `/shop-cart/**`, `/saveOrder`, and admin carousel management endpoints.
  • Change HTTP methods for state-changing operations to appropriate verbs (e.g., avoid using GET for order creation as seen in `/saveOrder`).
  • Add server-side validation to verify the origin and authenticity of requests, including CSRF token validation and additional confirmation steps for sensitive operations like order completion or cancellation.
  • Restrict or harden session cookie settings by enabling `SameSite` attributes to prevent cookies from being sent on cross-site requests.
  • Monitor and audit logs for suspicious activity related to the vulnerable endpoints and consider temporarily disabling or restricting access to these endpoints if possible until patches or fixes are applied.

Since the project has not yet responded with patches or fixes, consider applying web application firewall (WAF) rules to block suspicious CSRF attack patterns and educate users and administrators about the risks of visiting untrusted sites while authenticated.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart