CVE-2025-6865
Description
A vulnerability, which was classified as problematic, was found in DaiCuo up to 1.3.13. This affects an unknown part of the file /admin.php/addon/index. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-Site Request Forgery in DaiCuo CMS up to 1.3.13 allows remote attackers to perform unauthorized actions via crafted requests to /admin.php/addon/index.
Vulnerability
Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in DaiCuo CMS version 1.3.13 and earlier. The issue resides in the /admin.php/addon/index endpoint, where state-changing operations (such as deleting a friend entry) are performed without requiring a unique token or other CSRF protection. This allows an attacker to trick an authenticated administrator into unknowingly executing unwanted actions [1].
Exploitation
Attackers can exploit this vulnerability by crafting a malicious HTML page containing a hidden form that automatically submits a request to the vulnerable endpoint. The form can be embedded in a web page or sent via email, and requires no user interaction beyond the victim visiting the page while logged into DaiCuo CMS. The provided proof-of-concept demonstrates deleting a friend with ID 12 by submitting parameters such as module=friend, controll=admin, action=delete, and id=12 [1].
Impact
Successful exploitation allows an attacker to perform any action that the vulnerable endpoint supports, such as deleting data or modifying settings, with the privileges of the targeted administrator. Since the admin panel is accessible over the network, the attack can be initiated remotely. The impact is limited to the functionality exposed via the /admin.php/addon/index component [1].
Mitigation
As of the publication date, no official patch has been mentioned. Users should consider implementing CSRF tokens for all state-changing requests, verifying the Referer header, or restricting access to the admin panel until a security update is available.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/wwm1995/weiming_wang/blob/main/daicuocms_1.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.