Spina CMS media_folders cross-site request forgery
Description
A vulnerability classified as problematic was found in Spina CMS 2.18.0. Affected by this vulnerability is an unknown functionality of the file /admin/media_folders. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272431. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Spina CMS 2.18.0 has a CSRF vulnerability in the /admin/media_folders endpoint, allowing remote attackers to perform unauthorized actions.
Vulnerability
Overview
CVE-2024-7106 is a cross-site request forgery (CSRF) vulnerability found in Spina CMS version 2.18.0. The issue resides in the /admin/media_folders functionality, where the application fails to validate the origin of requests. This allows an attacker to craft a malicious web page that, when visited by an authenticated administrator, can submit unauthorized requests to the CMS on their behalf [1][3].
Attack
Vector
The attack is performed remotely by luring an authenticated admin to a specially crafted HTML page (proof of concept exists). The page contains a form that automatically submits a POST request to /admin/media_folders, including parameters such as a new folder name. Since the request is sent with the victim's session cookies, the server processes it as a legitimate action [4]. No additional authentication or user interaction beyond visiting the page is required [1].
Impact
An attacker exploiting this CSRF vulnerability can create, modify, or delete media folders within the Spina CMS admin panel without the victim's knowledge. This unauthorized manipulation of media resources can lead to data integrity issues and potentially serve as a stepping stone for further attacks, such as storing malicious content [3][4].
Mitigation
As of the publication date (2024-07-25), no patched version of Spina CMS has been released. The vendor was contacted but did not respond. Users are advised to implement additional CSRF protections, such as using anti-CSRF tokens and ensuring that sensitive admin actions are protected by same-site cookie attributes [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
spinaRubyGems | <= 2.18.0 | — |
Affected products
2- Spina/CMSv5Range: 2.18.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/topsky979/Security-Collections/blob/main/cve3/README.mdghsaexploitWEB
- github.com/advisories/GHSA-wqw3-p83g-r24vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-7106ghsaADVISORY
- vuldb.comghsathird-party-advisoryWEB
- rubysec.com/advisories/CVE-2024-7106ghsaWEB
- vuldb.comghsasignaturepermissions-requiredWEB
- vuldb.comghsavdb-entryWEB
News mentions
0No linked articles in our index yet.