misp-modules website - Missing CSRF protection in the website home blueprint
Critical severity
GitHub Reviewed
Published
Apr 29, 2026
in
MISP/misp-modules
•
Updated May 14, 2026
Description
Published to the GitHub Advisory Database
May 6, 2026
Reviewed
May 6, 2026
Published by the National Vulnerability Database
May 13, 2026
Last updated
May 14, 2026
A Cross-Site Request Forgery vulnerability in the MISP Modules website allowed an attacker to cause an authenticated user to submit unintended requests to the home endpoint. The vulnerability was due to the home blueprint being exempted from CSRF protection. This could allow modification of session query data in the context of the authenticated user. The issue was fixed by enabling CSRF protection for the affected blueprint and hardening query parsing. As reported by Bilal Teke.
References