Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Php Scriptlerim Who's Who script allow remote attackers to hijack the authentication of administrators or requests that (1) add an admin account via a request to filepath/yonetim/plugin/adminsave.php or have unspecified impact via a request to (2) ayarsave.php, (3) uyesave.php, (4) slaytadd.php, or (5) slaytsave.php.
Exploits (1)
References (3)
Core 3
Core References
Exploit x_refsource_misc
http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/35129
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/98631
Scores
EPSS
0.0020
EPSS Percentile
41.9%
Details
CWE
CWE-352
Status
published
Products (1)
phpscriptlerim/php_scriptlerim_who\'s_who
Published
Nov 17, 2014
Tracked Since
Feb 18, 2026