VYPR
Medium severity4.3NVD Advisory· Published Jan 6, 2026· Updated Apr 15, 2026

CVE-2020-36918

CVE-2020-36918

Description

iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without request validation. Attackers can craft malicious web pages to trick logged-in administrators into adding unauthorized users by exploiting the lack of CSRF protections.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

iDS6 DSSPro Digital Signage System 6.2 lacks CSRF protection, allowing attackers to trick administrators into performing administrative actions like adding unauthorized users.

Vulnerability in iDS6

DSSPro Digital Signage System 6.2 arises from a missing cross-site request forgery (CSRF) protection mechanism. The application interface processes HTTP requests without validating their origin, enabling attackers to craft malicious web pages that perform actions on behalf of an authenticated administrator [1][3][4].

To exploit this, an attacker must trick a logged-in administrator into visiting a specially crafted page. The exploit example demonstrates a form that automatically submits a POST request to the /Pages/user!addUser endpoint, adding a new user with attacker-controlled credentials [3][3][4]. No additional authentication or session token is required beyond the victim's active session.

Successful exploitation allows an attacker to perform administrative actions, such as creating unauthorized user accounts, without the administrator's knowledge or consent. This can lead to unauthorized access to the digital signage management system and potential compromise of the entire system [1][3][4].

As of the advisory publication date (July 2020), the vendor had not released a patch for the affected versions (CVSS 4.3) vulnerability. Users are advised to implement additional security controls, such as CSRF tokens or same-site cookie attributes, and to restrict access to the management interface [1][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.