CWE-352: Cross-Site Request Forgery (CSRF)
The web application does not sufficiently verify that a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Yearly Trend
Top Affected Vendors
All Cross-Site Request Forgery (CSRF) CVEs (2,376)
This CSRF vulnerability in the WPMK Ajax Finder WordPress plugin allows attackers to inject malicious scripts into WordPress admin settings pages. Att...
Jun 13, 2022This CSRF vulnerability in the Mobile browser color select WordPress plugin allows attackers to inject malicious scripts by tricking administrators in...
Jun 13, 2022The Copify WordPress plugin up to version 1.3.0 has a CSRF vulnerability that allows attackers to trick administrators into changing plugin settings a...
Jun 13, 2022This vulnerability in the Genki Pre-Publish Reminder WordPress plugin allows attackers to trick logged-in administrators into changing plugin settings...
Jun 13, 2022The Hot Linked Image Cacher WordPress plugin through version 1.16 is vulnerable to Cross-Site Request Forgery (CSRF). This allows attackers to trick a...
Jun 13, 2022This CSRF vulnerability in IBM Spectrum Copy Data Management allows attackers to trick authenticated users into performing unauthorized actions on the...
Jun 10, 2022Delta Controls enteliTOUCH building automation controllers have a cross-site request forgery (CSRF) vulnerability that allows attackers to execute arb...
Jun 2, 2022This CSRF vulnerability in MCMS 5.2.7 allows attackers to create unauthorized administrator accounts by tricking authenticated users into visiting mal...
Jun 2, 2022CVE-2022-30014 is a Cross-Site Request Forgery (CSRF) vulnerability in Lumidek Associates Simple Food Website 1.0 that allows attackers to perform una...
May 23, 2022This CSRF vulnerability in Online Banquet Booking System v1.0 allows attackers to trick authenticated administrators into unknowingly changing their o...
May 20, 2022This CSRF vulnerability in TIBCO BusinessConnect Trading Community Management allows unauthenticated attackers to trick authenticated users into perfo...
May 18, 2022This vulnerability allows attackers to execute arbitrary code on WordPress sites running the Code Snippets Extended plugin version 1.4.7 or earlier. A...
May 17, 2022A CSRF vulnerability in Jenkins Autocomplete Parameter Plugin allows attackers to trick authenticated administrators into executing arbitrary code wit...
May 17, 2022This CSRF vulnerability in Jenkins SSH Plugin allows attackers to trick authenticated users into unknowingly connecting to attacker-controlled SSH ser...
May 17, 2022This vulnerability allows attackers to trick logged-in WordPress administrators into uploading malicious files via Cross-Site Request Forgery (CSRF). ...
Apr 29, 2022This CSRF vulnerability in Mahara allows attackers to trick authenticated users into performing unintended actions by exploiting easily guessable rand...
Apr 28, 2022This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in IBM Cognos Analytics versions 11.1.7 and 11.2.0. An attacker could trick authe...
Apr 22, 2022This CSRF vulnerability in the MicroPayments WordPress plugin allows unauthenticated attackers to trick administrators into performing unintended acti...
Apr 20, 2022This vulnerability allows remote attackers to execute arbitrary code on Selenium Grid/Standalone Server instances via DNS rebinding attacks. Attackers...
Apr 15, 2022This CSRF vulnerability in Jenkins Publish Over FTP Plugin allows attackers to trick authenticated users into connecting to attacker-controlled FTP se...
Apr 12, 2022This is a Cross-Site Request Forgery (CSRF) vulnerability in Siemens SCALANCE industrial network switches. Attackers can trick authenticated users int...
Apr 12, 2022This CSRF vulnerability in Webmin 1.973 allows attackers to trick authenticated administrators into performing unauthorized file uploads or downloads ...
Apr 11, 2022This CSRF vulnerability in Webmin's File Manager allows attackers to trick authenticated administrators into performing unauthorized file operations. ...
Apr 11, 2022This CSRF vulnerability in qdPM 9.2 allows attackers to trick authenticated users into performing unintended actions via the myAccount/update endpoint...
Apr 8, 2022This CSRF vulnerability in Firmware Analysis and Comparison Tool v3.2 allows attackers to perform unauthorized actions as logged-in administrators by ...
Mar 30, 2022This CSRF vulnerability in Pluck CMS v4.7.15 allows attackers to trick authenticated users into unknowingly changing their passwords via malicious req...
Mar 30, 2022This CSRF vulnerability in Jenkins Job and Node ownership Plugin allows attackers to change job owners and permissions without authentication. It affe...
Mar 29, 2022This CSRF vulnerability in Jenkins JiraTestResultReporter Plugin allows attackers to trick authenticated users into connecting Jenkins to attacker-con...
Mar 29, 2022This vulnerability in the Sermon Browser WordPress plugin allows attackers to trick logged-in administrators into uploading malicious files like PHP s...
Mar 28, 2022This vulnerability in the Translate WordPress with GTranslate plugin allows attackers to steal admin session cookies via CSRF attacks. Attackers can t...
Mar 28, 2022TypesetterCMS v5.1 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into performing unint...
Mar 25, 2022This CSRF vulnerability in xiaohuanxiong CMS allows attackers to create unauthorized administrator accounts by tricking legitimate administrators into...
Mar 23, 2022This CSRF vulnerability in Chamilo LMS allows attackers to trick authenticated users into executing arbitrary commands on the server by clicking a mal...
Mar 21, 2022BigAnt Server v5.6.06 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into performing un...
Mar 21, 2022A cross-site request forgery (CSRF) vulnerability in Jenkins Extended Choice Parameter Plugin allows attackers to trick authenticated users into makin...
Mar 15, 2022This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in IBM Spectrum Protect Operations Center versions 8.1.0.000 through 8.1.13.xxx. ...
Mar 14, 2022PONTON X/P Messenger versions before 3.11.2 have globally valid anti-CSRF tokens, allowing attackers to use low-privileged user tokens to perform acti...
Mar 13, 2022This CSRF vulnerability in Subrion CMS allows remote attackers to create arbitrary administrator accounts without authentication by tricking authentic...
Mar 4, 2022The Core Tweaks WP Setup WordPress plugin through version 4.1 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to chan...
Feb 28, 2022This vulnerability in JetBrains TeamCity allows attackers to inject malicious URLs that can lead to Cross-Site Request Forgery (CSRF) attacks. It affe...
Feb 25, 2022This CSRF vulnerability in FileCloud's CSV user import functionality allows attackers to trick authenticated administrators into unknowingly creating ...
Feb 16, 2022This CSRF vulnerability in Jenkins dbCharts Plugin allows attackers to trick authenticated users into making unauthorized database connections via JDB...
Feb 15, 2022This CSRF vulnerability in Jenkins Chef Sinatra Plugin allows attackers to trick authenticated Jenkins users into making unauthorized HTTP requests to...
Feb 15, 2022The Jenkins Snow Commander Plugin contains a CSRF vulnerability that allows attackers to trick authenticated users into unknowingly connecting Jenkins...
Feb 15, 2022This CSRF vulnerability in Jenkins autonomiq Plugin allows attackers to trick authenticated users into unknowingly connecting Jenkins to attacker-cont...
Feb 15, 2022This CSRF vulnerability in Jenkins SCP publisher Plugin allows attackers to trick authenticated users into unknowingly connecting Jenkins to attacker-...
Feb 15, 2022This CSRF vulnerability in Jenkins Checkmarx Plugin allows attackers to trick authenticated users into connecting to malicious servers using stolen cr...
Feb 15, 2022This vulnerability in the SupportCandy WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that can set malicious f...
Feb 7, 2022This CSRF vulnerability in Schneider Electric Modicon PLCs allows attackers to trick authenticated users into performing unauthorized actions or leaki...
Feb 4, 2022IBM Financial Transaction Manager 3.2.4 contains a cross-site request forgery (CSRF) vulnerability that allows attackers to trick authenticated users ...
Feb 2, 2022About Cross-Site Request Forgery (CSRF) (CWE-352)
The web application does not sufficiently verify that a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Our database tracks 2,376 CVEs classified as CWE-352, with 63 rated critical and 1,299 rated high severity. The average CVSS score for Cross-Site Request Forgery (CSRF) vulnerabilities is 6.7.
External reference: View CWE-352 on MITRE CWE →
Monitor Cross-Site Request Forgery (CSRF) Vulnerabilities
Get alerted when new Cross-Site Request Forgery (CSRF) CVEs affect your infrastructure.
Start Monitoring Free