Vulnerabilities
Vulnerable Software
Wallabag:  Security Vulnerabilities
wallabag version 2.5.2 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to arbitrarily delete user accounts via the /account/delete endpoint. This issue is fixed in version 2.5.4.
CVSS Score
6.5
EPSS Score
0.001
Published
2024-11-15
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.
CVSS Score
6.5
EPSS Score
0.001
Published
2023-08-21
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.
CVSS Score
4.3
EPSS Score
0.001
Published
2023-08-21
A vulnerability was found in wallabag 2.5.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /config of the component Profile Config. The manipulation of the argument Name leads to allocation of resources. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233359. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
3.5
EPSS Score
0.001
Published
2023-07-10
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.4.
CVSS Score
7.3
EPSS Score
0.001
Published
2023-03-05
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.
CVSS Score
6.5
EPSS Score
0.001
Published
2023-02-07
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
CVSS Score
4.6
EPSS Score
0.001
Published
2023-02-07
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
CVSS Score
6.5
EPSS Score
0.005
Published
2023-02-01
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
CVSS Score
5.4
EPSS Score
0.001
Published
2023-02-01
The Wallabag application 2.2.3 to 2.3.2 is affected by one cross-site scripting (XSS) vulnerability that is stored within the configuration page. This vulnerability enables the execution of a JavaScript payload each time an administrator visits the configuration page. The vulnerability can be exploited with authentication and used to target administrators and steal their sessions.
CVSS Score
4.0
EPSS Score
0.005
Published
2018-09-21


Contact Us

Shodan ® - All rights reserved