๐Ÿ” CVE Alert

CVE-2026-34384

MEDIUM 4.5

Admidio: Missing CSRF Protection on Registration Approval Actions

CVSS Score
4.5
EPSS Score
0.0%
EPSS Percentile
2th

Admidio is an open-source user management solution. Prior to version 5.0.8, the create_user, assign_member, and assign_user action modes in modules/registration.php approve pending user registrations via GET request without validating a CSRF token. Unlike the delete_user mode in the same file (which correctly validates the token), these three approval actions read their parameters from $_GET and perform irreversible state changes without any protection. An attacker who has submitted a pending registration can extract their own user UUID from the registration confirmation email URL, then trick any user with the rol_approve_users right into visiting a crafted URL that automatically approves the registration. This bypasses the manual registration approval workflow entirely. This issue has been patched in version 5.0.8.

CWE CWE-352
Vendor admidio
Product admidio
Published Mar 31, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for admidio admidio

Be the first to know when new medium vulnerabilities affecting admidio admidio are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

Admidio / admidio
< 5.0.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Admidio/admidio/security/advisories/GHSA-ph84-r98x-2j22 github.com: https://github.com/Admidio/admidio/commit/707171c188b3e8f36007fc3f2bccbfac896ed019