| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wwg8-6ffr-h4q2 | Admidio is Missing CSRF Validation on Role Delete, Activate, and Deactivate Actions |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Admidio
Admidio admidio |
|
| Vendors & Products |
Admidio
Admidio admidio |
Thu, 19 Mar 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the delete, activate, and deactivate modes in modules/groups-roles/groups_roles.php perform destructive state changes on organizational roles but never validate an anti-CSRF token. The client-side UI passes a CSRF token to callUrlHideElement(), which includes it in the POST body, but the server-side handlers ignore $_POST["adm_csrf_token"] entirely for these three modes. An attacker who can discover a role UUID (visible in the public cards view when the module is publicly accessible) can embed a forged POST form on any external page and trick any user with the rol_assign_roles right into deleting or toggling roles for the organization. Role deletion is permanent and cascades to all memberships, event associations, and rights data. If exploited, an attacker can trick any user with delegated role-assignment rights into permanently deleting roles, mass-revoking all associated memberships and access to events, documents, and mailing lists, or silently activating or deactivating entire groups, with target role UUIDs trivially harvested from the unauthenticated public cards view and no undo path short of a database restore. This issue has been fixed in version 5.0.7. | |
| Title | Admidio has Missing CSRF Validation on Role Delete, Activate, and Deactivate Actions | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T17:29:42.359Z
Reserved: 2026-03-16T17:35:36.696Z
Link: CVE-2026-32816
Updated: 2026-03-20T17:29:28.902Z
Status : Awaiting Analysis
Published: 2026-03-19T23:16:44.380
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-32816
No data.
OpenCVE Enrichment
Updated: 2026-03-20T10:43:58Z
Github GHSA