VYPR
High severityNVD Advisory· Published Jul 20, 2023· Updated Oct 24, 2024

CVE-2023-37650

CVE-2023-37650

Description

A Cross-Site Request Forgery (CSRF) in the Admin portal of Cockpit CMS v2.5.2 allows attackers to execute arbitrary Administrator commands.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cockpit CMS v2.5.2 Admin portal is vulnerable to CSRF, allowing attackers to execute arbitrary admin commands without authentication.

Vulnerability

Overview

CVE-2023-37650 describes a Cross-Site Request Forgery (CSRF) vulnerability in the Admin portal of Cockpit CMS version 2.5.2. The root cause is the lack of CSRF token validation on internal API calls in the admin interface [1]. This allows an attacker to craft malicious requests that, when executed by an authenticated administrator, perform unintended actions on their behalf. The issue was reported to the vendor on 2023/06/08 and was addressed in the subsequent release [1][4].

Exploitation and

Attack Surface

The attack vector is network-based, requiring no authentication on the part of the attacker but relying on tricking an already-authenticated admin user into visiting a malicious page or clicking a crafted link. No special privileges beyond the victim's existing admin session are needed. The attacker can exploit the lack of CSRF protection to perform any action available to the admin, such as modifying site content, creating new users, or executing arbitrary commands [1]. This is possible because the admin portal does not validate CSRF tokens, making it susceptible to forged requests [1].

Impact

Successful exploitation allows an attacker to execute arbitrary administrator commands, effectively gaining full control of the Cockpit CMS instance. This could lead to data theft, site defacement, or further compromise of the server if the CMS is used in a broader infrastructure. The impact is considered high due to the potential for complete control over the application.

Mitigation and

Patching

The vulnerability has been patched in Cockpit CMS version 2.6.0, which adds CSRF token validation to internal API calls [1][4]. Users are strongly advised to upgrade to this or a later version. For those unable to upgrade immediately, implementing a Web Application Firewall (WAF) rule to block suspicious requests or enforcing same-origin policy checks may serve as temporary mitigation. The vendor recommends keeping the application updated and configuring security keys properly [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cockpit-hq/cockpitPackagist
< 2.6.02.6.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.