tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/upd/status. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/xujeff/tianti/issues/39 | Exploit Third Party Advisory Issue Tracking | 
| https://github.com/xujeff/tianti/issues/39 | Exploit Third Party Advisory Issue Tracking | 
Configurations
                    History
                    21 May 2025, 19:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/xujeff/tianti/issues/39 - Exploit, Third Party Advisory, Issue Tracking | |
| First Time | Tianti Project tianti Tianti Project | |
| CPE | cpe:2.3:a:tianti_project:tianti:2.3:*:*:*:*:*:*:* | 
12 Mar 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-352 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.0 | 
| References | () https://github.com/xujeff/tianti/issues/39 - | |
| Summary | 
 | 
10 Mar 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-10 22:15
Updated : 2025-05-21 19:34
NVD link : CVE-2025-27910
Mitre link : CVE-2025-27910
CVE.ORG link : CVE-2025-27910
JSON object : View
Products Affected
                tianti_project
- tianti
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
