In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade wallabag/wallabag
to version 2.6.11 or higher.
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the endpoints listed below. An attacker can manipulate user data or configuration settings, and perform unauthorized actions by convincing users to follow malicious links that execute unintended actions.
Vulnerable endpoints and their associated actions:
Manage API Tokens: /generate-token
, /revoke-token
Manage User Rules: /tagging-rule/delete/{taggingRule}
, /ignore-origin-user-rule/delete/{ignoreOriginUserRule}
Modify User Configuration: /config/view-mode
Manage Individual Entries: /reload/{id}
, /archive/{id}
, /star/{id}
, /delete/{id}
, /share/{id}
, /share/delete/{id}
Manage Tags: /remove-tag/{entry}/{tag}
, /tag/search/{filter}
, /tag/delete/{slug}
Perform Bulk Actions: /mass
Change Interface Language (Login Page): /locale/{language}