Cross-site Request Forgery (CSRF) Affecting wallabag/wallabag package, versions <2.6.11


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-WALLABAGWALLABAG-9749529
  • published18 Apr 2025
  • disclosed9 Apr 2025
  • creditYassine Guedidi

Introduced: 9 Apr 2025

New CVE NOT AVAILABLE CWE-352  (opens in a new tab)

How to fix?

Upgrade wallabag/wallabag to version 2.6.11 or higher.

Overview

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the endpoints listed below. An attacker can manipulate user data or configuration settings, and perform unauthorized actions by convincing users to follow malicious links that execute unintended actions.

Vulnerable endpoints and their associated actions:

Manage API Tokens: /generate-token, /revoke-token

Manage User Rules: /tagging-rule/delete/{taggingRule}, /ignore-origin-user-rule/delete/{ignoreOriginUserRule}

Modify User Configuration: /config/view-mode

Manage Individual Entries: /reload/{id}, /archive/{id}, /star/{id}, /delete/{id}, /share/{id}, /share/delete/{id}

Manage Tags: /remove-tag/{entry}/{tag}, /tag/search/{filter}, /tag/delete/{slug}

Perform Bulk Actions: /mass

Change Interface Language (Login Page): /locale/{language}

CVSS Base Scores

version 4.0
version 3.1