CVE-2016-20054
Received Received - Intake
CSRF Vulnerability in Nodcms Allows Unauthorized Admin Actions

Publication date: 2026-04-04

Last updated on: 2026-04-14

Assigner: VulnCheck

Description
Nodcms contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious forms. Attackers can trick authenticated administrators into submitting requests to admin/user_manipulate and admin/settings/generall endpoints to create users or modify application settings without explicit consent.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-04
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nodcms nodcms 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue in nodCMS, a PHP-based content management system. It allows attackers to trick authenticated administrators into performing unauthorized administrative actions by submitting maliciously crafted forms.

Specifically, attackers can cause administrators to unknowingly send requests to sensitive endpoints like /admin/user_manipulate and /admin/settings/generall. These requests can create new user accounts or modify application settings without the administrator's explicit consent.

The vulnerability arises because nodCMS lacks proper CSRF protections on these administrative functions, enabling attackers to exploit the trust of authenticated users.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized administrative actions being performed on your nodCMS installation without your knowledge or consent.

  • Attackers can create new user accounts with administrative privileges, potentially giving them persistent access.
  • Attackers can modify application settings, including injecting malicious scripts (stored Cross-Site Scripting) that can compromise the security of the application and its users.

Overall, this can result in loss of control over the CMS, data integrity issues, and potential further exploitation through injected scripts.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or suspicious HTTP POST requests to the endpoints /admin/user_manipulate and /admin/settings/generall. Specifically, look for POST requests that attempt to create new users or modify settings without explicit administrator action.

You can use network monitoring tools like tcpdump or Wireshark to capture HTTP traffic and filter for POST requests to these endpoints.

Example commands to detect such activity include:

  • Using tcpdump to capture POST requests to /admin/user_manipulate: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'POST /admin/user_manipulate'
  • Using tcpdump to capture POST requests to /admin/settings/generall: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'POST /admin/settings/generall'

Additionally, reviewing web server logs for unexpected POST requests to these endpoints with parameters related to user creation or settings modification can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this cross-site request forgery (CSRF) vulnerability in nodCMS, immediate steps include:

  • Implement CSRF protection tokens in all administrative forms, especially those handling user creation and settings modification.
  • Restrict access to administrative endpoints to trusted IP addresses or networks where possible.
  • Ensure that administrative actions require explicit user interaction and confirmation.
  • Review and monitor logs for suspicious POST requests to /admin/user_manipulate and /admin/settings/generall.
  • Update nodCMS to a version that includes fixes for this vulnerability if available.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to perform unauthorized administrative actions, such as creating users or modifying application settings without explicit consent. This unauthorized access and manipulation can lead to violations of data protection principles required by standards like GDPR and HIPAA, which mandate strict controls over user data and administrative actions.

Specifically, the ability to inject malicious scripts (XSS) and create unauthorized users can compromise the integrity and confidentiality of personal data, potentially leading to data breaches or unauthorized data processing.

Therefore, this vulnerability could negatively impact compliance with regulations that require secure access controls, user consent, and protection against unauthorized administrative changes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart