VYPR
Medium severity4.3NVD Advisory· Published May 13, 2026· Updated May 13, 2026

CVE-2020-37217

CVE-2020-37217

Description

Easy2Pilot 7 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the admin.php?action=add_user endpoint with POST requests containing username and password parameters to create new administrative accounts without explicit user consent.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Easy2Pilot 7 is vulnerable to CSRF allowing attackers to add unauthorized admin accounts by tricking authenticated administrators into visiting malicious pages.

Vulnerability

Overview

Easy2Pilot 7 contains a cross-site request forgery (CSRF) vulnerability in the admin.php?action=add_user endpoint. The application fails to implement anti-CSRF tokens or other validation mechanisms, allowing an attacker to craft a malicious HTML form that submits a POST request with username and password parameters to create a new administrative user [1][2].

Exploitation

An attacker can host a crafted HTML page (e.g., poc.html) that automatically submits the form when visited by an authenticated administrator. The attack requires no special privileges beyond tricking the admin into loading the page, typically via social engineering or by embedding the form in a trusted site [1]. The PoC code demonstrates a straightforward form targeting the vulnerable endpoint [1].

Impact

Successful exploitation allows the attacker to create a new administrative account without the administrator's consent. This grants the attacker full control over the Easy2Pilot application, including the ability to modify settings, access sensitive data, or perform further malicious actions [2].

Mitigation

As of the publication date, no official patch has been released. Administrators should implement CSRF protection, such as synchronizer tokens or same-site cookies, and restrict access to the admin.php interface. Additionally, users should be cautious of unsolicited links and consider using browser extensions that block automatic form submissions [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.