VYPR
High severityNVD Advisory· Published Sep 23, 2018· Updated Aug 5, 2024

CVE-2018-17366

CVE-2018-17366

Description

An issue was discovered in MCMS 4.6.5. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MCMS 4.6.5 has a CSRF vulnerability that allows an attacker to add a new administrator account by tricking a logged-in admin into visiting a crafted request.

Vulnerability

MCMS version 4.6.5 is vulnerable to Cross-Site Request Forgery (CSRF) in the administrator account creation endpoint. The flaw resides in /ms/basic/manager/save.do, which does not validate the origin or include an anti-CSRF token. As a result, an attacker can force a logged-in administrator to unknowingly submit a request that creates a new administrative account. The affected version is clearly stated in the CVE description [1][2].

Exploitation

To exploit this vulnerability, an attacker must trick an authenticated administrator into visiting a malicious web page or clicking a crafted link while their session is active. No special network position is required beyond the ability to deliver the crafted request (e.g., via phishing email or a compromised site). The attacker crafts a request to ms/basic/manager/save.do with parameters that define a new administrator account (e.g., username, password, role). When the victim's browser sends the request, it includes the administrator's session cookie, and the server processes it as legitimate [1][2].

Impact

A successful CSRF attack results in the unauthorized creation of an administrator account. The attacker then gains full administrative privileges over the MCMS instance, allowing them to manage content, users, and system settings. This leads to a complete compromise of confidentiality, integrity, and availability of the affected application [1][2].

Mitigation

As of the publication date (2018-09-23), no official patch or fixed version has been released. The project repository does not indicate a newer version that addresses this issue [1][2]. The recommended mitigation is to implement CSRF protection, such as synchronizer tokens or same-site cookies, on sensitive actions like administrator creation. Additionally, administrators should avoid clicking suspicious links while logged into the application. The CVE is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
net.mingsoft:ms-mcmsMaven
<= 4.6.5

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.