CVE-2026-34384

Admidio is an open-source user management solution. Prior to version 5.0.8, the create_user, assign_member, and assign_user action modes in modules/registration.php approve pending user registrations via GET request without validating a CSRF token. Unlike the delete_user mode in the same file (which correctly validates the token), these three approval actions read their parameters from $_GET and perform irreversible state changes without any protection. An attacker who has submitted a pending registration can extract their own user UUID from the registration confirmation email URL, then trick any user with the rol_approve_users right into visiting a crafted URL that automatically approves the registration. This bypasses the manual registration approval workflow entirely. This issue has been patched in version 5.0.8.
Configurations

Configuration 1 (hide)

cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*

History

01 Apr 2026, 18:31

Type Values Removed Values Added
CPE cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*
First Time Admidio
Admidio admidio
References () https://github.com/Admidio/admidio/commit/707171c188b3e8f36007fc3f2bccbfac896ed019 - () https://github.com/Admidio/admidio/commit/707171c188b3e8f36007fc3f2bccbfac896ed019 - Patch
References () https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22 - () https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22 - Exploit, Mitigation, Vendor Advisory

01 Apr 2026, 17:28

Type Values Removed Values Added
References () https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22 - () https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22 -

31 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 21:16

Updated : 2026-04-01 18:31


NVD link : CVE-2026-34384

Mitre link : CVE-2026-34384

CVE.ORG link : CVE-2026-34384


JSON object : View

Products Affected

admidio

  • admidio
CWE
CWE-352

Cross-Site Request Forgery (CSRF)