GHSA-5pm7-cp8f-p2c2

Suggest an improvement
Source
https://github.com/advisories/GHSA-5pm7-cp8f-p2c2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-5pm7-cp8f-p2c2/GHSA-5pm7-cp8f-p2c2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-5pm7-cp8f-p2c2
Published
2025-04-09T13:09:26Z
Modified
2025-04-09T13:31:43.758713Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
wallabag/wallabag Has Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities
Details

Impact

wallabag versions prior to 2.6.11 were discovered to contain multiple Cross-Site Request Forgery (CSRF) vulnerabilities across several endpoints. An attacker could craft a malicious link or page that, if visited by a logged-in wallabag user, could trick the user's browser into performing unintended actions within their wallabag account without their consent. Additionally, one endpoint affects the login page locale setting.

The affected endpoints allow attackers to potentially perform actions such as:

  • Manage API Tokens:
    • /generate-token
    • /revoke-token
  • Manage User Rules:
    • /tagging-rule/delete/{taggingRule}
    • /ignore-origin-user-rule/delete/{ignoreOriginUserRule}
  • Modify User Configuration:
    • /config/view-mode
  • Manage Individual Entries:
    • /reload/{id}
    • /archive/{id}
    • /star/{id}
    • /delete/{id}
    • /share/{id}
    • /share/delete/{id}
  • Manage Tags:
    • /remove-tag/{entry}/{tag}
    • /tag/search/{filter}
    • /tag/delete/{slug}
  • Perform Bulk Actions:
    • /mass
  • Change Interface Language (Login Page):
    • /locale/{language}

Successfully exploiting these vulnerabilities could lead to unauthorized modification or deletion of user data, configuration changes, token manipulation, or interface changes, depending on the specific endpoint targeted.

This set of vulnerabilities has an aggregated CVSS v3.1 score of 4.3 (Medium).

Users are strongly advised to upgrade their wallabag instance to version 2.6.11 or later to mitigate these vulnerabilities.

Resolution

These vulnerabilities have been addressed in wallabag version 2.6.11. The affected endpoints have been modified to require the HTTP POST method along with a valid CSRF token for state-changing actions, preventing attackers from forcing users' browsers to perform these actions unintentionally.

Credits

Found, reported and fixed by @yguedidi

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-09T13:09:26Z"
}
References

Affected packages

Packagist / wallabag/wallabag

Package

Name
wallabag/wallabag
Purl
pkg:composer/wallabag/wallabag

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.11

Affected versions

1.*

1.0-beta1
1.0-beta2
1.0-beta3
1.0-beta4
1.0-beta5
1.0-beta5.1
1.0-beta5.2
1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.4.0
1.5.0
1.5.1
1.5.1.1
1.5.2
1.6.0
1.6.1b
1.6.1
1.7.0
1.7.1
1.7.2
1.8.0
1.8.1b
1.8.1
1.9beta
1.9beta2
1.9RC1
1.9
1.9.1alpha1
1.9.1alpha2
1.9.1-b
1.9.1beta1
1.9.1beta2
1.9.1beta3
1.9.1
1.9.2

2.*

2.0.0-alpha.0
2.0.0-alpha.1
2.0.0-alpha.2
2.0.0-beta.1
2.0.0-beta.2
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.6.1
2.2.0
2.2.1
2.2.2
2.2.3
2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.4.0
2.4.1
2.4.2
2.4.3
2.5.0
2.5.1
2.5.2
2.5.3
2.5.4
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9
2.6.10