CVE-2025-55045
CSRF Vulnerability in MuraCMS updateAddress Enables Unauthorized Data Manipulation
Publication date: 2026-03-18
Last updated on: 2026-03-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| murasoftware | mura_cms | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in MuraCMS versions up to 10.1.10, specifically in the updateAddress function. The function does not validate CSRF tokens, which allows attackers to trick authenticated administrators into submitting malicious requests by visiting a crafted webpage. These requests can add, modify, or delete user address information without the administrator's consent.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to unauthorized changes to user address information within the MuraCMS system. Attackers can add malicious addresses with their own contact details, update existing addresses to redirect communications to attacker-controlled locations, or delete legitimate address records. This can result in misdirected sensitive communications, compromise of user privacy, disruption of business operations, and enable social engineering attacks using corrupted address data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know