Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dovestones:ad_self_update:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dovestones
Dovestones ad Self Update |
|
| Vendors & Products |
Dovestones
Dovestones ad Self Update |
Wed, 22 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Site Request Forgery Enables Unauthorized User Account Modification |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 | |
| Metrics |
cvssV3_1
|
Tue, 21 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dovestones Softwares AD Self Update <4.0.0.5 is vulnerable to Cross Site Request Forgery (CSRF). The affected endpoint processes state-changing requests without requiring a CSRF token or equivalent protection. The endpoint accepts application/x-www-form-urlencoded requests, and an originally POST-based request can be converted to a GET request while still successfully updating user details. This allows an attacker to craft a malicious request that, when visited by an authenticated user, can modify user account information without their consent. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-21T18:21:08.828Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31014
Updated: 2026-04-21T18:21:00.520Z
Status : Analyzed
Published: 2026-04-21T15:16:36.337
Modified: 2026-04-23T16:21:21.553
Link: CVE-2026-31014
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:05Z