{"api_version":"1","generated_at":"2026-04-23T15:09:08+00:00","cve":"CVE-2020-23960","urls":{"html":"https://cve.report/CVE-2020-23960","api":"https://cve.report/api/cve/CVE-2020-23960.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-23960","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-23960"},"summary":{"title":"CVE-2020-23960","description":"Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-01-11 16:15:00","updated_at":"2021-07-12 13:58:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://www.fork-cms.com/blog/detail/fork-5.8.3-released","name":"https://www.fork-cms.com/blog/detail/fork-5.8.3-released","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"Fork 5.8.3 released - Blog -  Fork CMS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/forkcms/forkcms/pull/3123","name":"https://github.com/forkcms/forkcms/pull/3123","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Add more csrf checks by carakas · Pull Request #3123 · forkcms/forkcms · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-23960","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-23960","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"23960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fork-cms","cpe5":"fork","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"23960","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fork-cms","cpe5":"fork","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"23960","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fork-cms","cpe5":"fork_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-23960","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/forkcms/forkcms/pull/3123","refsource":"MISC","name":"https://github.com/forkcms/forkcms/pull/3123"},{"url":"https://www.fork-cms.com/blog/detail/fork-5.8.3-released","refsource":"MISC","name":"https://www.fork-cms.com/blog/detail/fork-5.8.3-released"}]}},"nvd":{"publishedDate":"2021-01-11 16:15:00","lastModifiedDate":"2021-07-12 13:58:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:fork-cms:fork_cms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.8.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"23960","Ordinal":"185369","Title":"CVE-2020-23960","CVE":"CVE-2020-23960","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"23960","Ordinal":"1","NoteData":"Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"23960","Ordinal":"2","NoteData":"2021-01-11","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"23960","Ordinal":"3","NoteData":"2021-01-11","Type":"Other","Title":"Modified"}]}}}