CSRF in aimhubio/aim
Description
aimhubio/aim version 3.22.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the tracking server. The vulnerability is due to overly permissive CORS settings, allowing cross-origin requests from all origins. This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-Site Request Forgery (CSRF) in aimhubio/aim 3.22.0 due to overly permissive CORS settings, enabling attacks on all tracking server endpoints.
Vulnerability
Analysis
CVE-2024-7760 describes a Cross-Site Request Forgery (CSRF) vulnerability in the aimhubio/aim tracking server version 3.22.0. The root cause is an overly permissive CORS (Cross-Origin Resource Sharing) configuration that allows cross-origin requests from all origins (*). This misconfiguration enables an attacker to craft malicious web pages that can trigger unauthorized actions on behalf of an authenticated user against the tracking server [1][2].
Exploitation
Scenario
An attacker can exploit this vulnerability by tricking a victim who is currently authenticated to an aim tracking server into visiting a malicious page. Because the CORS policy allows any origin, the attacker's page can make arbitrary cross-origin requests to the tracking server's endpoints, inheriting the victim's session credentials. The vulnerability affects all endpoints of the tracking server, meaning an attacker can interact with any API without restriction [2][3].
Impact
The CSRF vulnerability is particularly severe because it can be chained with other existing vulnerabilities in aim, such as remote code execution (RCE), denial of service (DoS), and arbitrary file read/write. By combining CSRF with these exploits, an attacker could achieve full compromise of the tracking server and its data, including execution of arbitrary code on the server, making the attack impact critical [2].
Mitigation
Status
As of the publication date, the vulnerability exists in aim version 3.22.0. Users are advised to update to a patched version as soon as one becomes available. The project maintainers should implement proper CORS origin validation to only allow trusted domains, and users should consider additional protections such as CSRF tokens and same-site cookie attributes. No CVE was found that supersedes this one in the references; the provided references link to the project page [1], the NVD entry [2], and the Huntr bounty page [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
aimPyPI | <= 3.22.0 | — |
Affected products
3- aimhubio/aimhubio/aimv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.