CVE-2023-40172

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40172
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40172.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-40172
Aliases
  • GHSA-873h-pqjx-3pwg
Published
2023-08-18T21:48:42.294Z
Modified
2025-12-05T00:03:23.364239Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Cross-Site Request Forgery (CSRF) in fobybus/social-media-skeleton
Details

Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. A Cross-site request forgery (CSRF) attack is a type of malicious attack whereby an attacker tricks a victim into performing an action on a website that they do not intend to do. This can be done by sending the victim a malicious link or by exploiting a vulnerability in the website. Prior to version 1.0.5 Social media skeleton did not properly restrict CSRF attacks. This has been addressed in version 1.0.5 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/40xxx/CVE-2023-40172.json",
    "cwe_ids": [
        "CWE-352"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/fobybus/social-media-skeleton

Affected ranges

Type
GIT
Repo
https://github.com/fobybus/social-media-skeleton
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.3
1.0.4

v1.*

v1.0.1
v1.0.2