UnoPim vulnerable to CSRF on Product edit feature and creation of other types
Description
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Before 0.2.1, some of the endpoints of the application is vulnerable to Cross site Request forgery (CSRF). This vulnerability is fixed in 0.2.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
UnoPim before 0.2.1 contains multiple POST endpoints lacking CSRF protection, allowing attackers to perform unauthorized state-changing operations via cross-site request forgery.
Root
Cause
The vulnerability is a classic Cross-Site Request Forgery (CSRF) in the UnoPim open-source PIM system built on Laravel. Multiple POST endpoints that perform state-changing actions—such as creating or editing products, categories, category fields, and attributes—do not validate a CSRF token (e.g., the X-XSRF-TOKEN header) [2]. This allows an attacker to forge requests on behalf of an authenticated admin without their consent.
Exploitation
Because the vulnerable endpoints accept application/x-www-form-urlencoded or multipart/form-data content types and the application sets cookies with SameSite=None, an attacker can craft a simple HTML form on a malicious site that, when visited by an authenticated admin, automatically submits a cross-origin request to UnoPim [2]. No preflight or special headers are required, making the attack straightforward to execute. A proof-of-concept using Burp Suite demonstrates changing a product's price by simply opening a crafted HTML page [2].
Impact
A successful CSRF attack allows an attacker to perform any action available on the vulnerable endpoints, such as modifying product prices, editing product details, creating or altering categories, and manipulating other settings—all without the victim admin's knowledge or intent [1][2]. This can lead to data integrity loss and operational disruption.
Mitigation
The vulnerability is fixed in version 0.2.1 of UnoPim [1][2]. Users are strongly advised to upgrade immediately. There is no evidence that this CVE is on the CISA Known Exploited Vulnerabilities (KEV) catalog as of publication.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
unopim/unopimPackagist | < 0.2.1 | 0.2.1 |
Affected products
2- unopim/unopimv5Range: < 0.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-287x-6r2h-f9mwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-55744ghsaADVISORY
- drive.proton.me/urls/VXNDKQ4WKRghsax_refsource_MISCWEB
- github.com/unopim/unopim/security/advisories/GHSA-287x-6r2h-f9mwghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.