CVE-2023-49447
Description
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/update.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JFinalCMS v5.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) via /admin/nav/update, allowing unauthorized navigation changes.
JFinalCMS v5.0.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the /admin/nav/update endpoint [1]. The application fails to validate or include anti-CSRF tokens, enabling attackers to craft malicious requests that modify navigation items on behalf of an authenticated administrator [2].
To exploit this, an attacker must trick an authenticated admin into visiting a crafted HTML page containing a hidden form that automatically submits a POST request to /admin/nav/update [2]. The PoC demonstrates modifying navigation properties such as name and URL, without requiring any user interaction beyond opening the malicious page [2].
Successful exploitation allows the attacker to alter navigation links, potentially redirecting users to phishing sites or defacing the CMS [1]. The impact is limited to authenticated sessions, but the lack of CSRF protections means any change made by the admin can be weaponized [1].
As of the disclosure date, no patch or official workaround has been published [1]. Administrators should implement CSRF tokens manually or restrict access to the admin panel [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.jfinal:jfinalMaven | <= 5.0.0 | — |
Affected products
2- JFinalCMS/JFinalCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.