Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Easy2pilot
Easy2pilot easy2pilot |
|
| Vendors & Products |
Easy2pilot
Easy2pilot easy2pilot |
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Easy2Pilot 7 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the admin.php?action=add_user endpoint with POST requests containing username and password parameters to create new administrative accounts without explicit user consent. | |
| Title | Easy2Pilot 7 Cross-Site Request Forgery via admin.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T18:20:32.216Z
Reserved: 2026-05-13T13:38:45.714Z
Link: CVE-2020-37217
Updated: 2026-05-13T18:18:52.343Z
Status : Deferred
Published: 2026-05-13T16:16:33.013
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37217
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:34:23Z