{"api_version":"1","generated_at":"2026-04-17T09:16:53+00:00","cve":"CVE-2023-4659","urls":{"html":"https://cve.report/CVE-2023-4659","api":"https://cve.report/api/cve/CVE-2023-4659.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-4659","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-4659"},"summary":{"title":"CVE-2023-4659","description":"Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to \"admin\". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication.","state":"PUBLIC","assigner":"cve-coordination@incibe.es","published_at":"2023-10-02 15:15:00","updated_at":"2023-10-04 17:01:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-free5gc","name":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-free5gc","refsource":"MISC","tags":[],"title":"Cross Site Request Forgery Free5gc | INCIBE-CERT | INCIBE","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-4659","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4659","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"4659","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"free5gc","cpe5":"free5gc","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-4659","ASSIGNER":"cve-coordination@incibe.es","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to \"admin\". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)","cweId":"CWE-352"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Free5Gc","product":{"product_data":[{"product_name":"Open5Gc","version":{"version_data":[{"version_affected":"=","version_value":"1.1.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-free5gc","refsource":"MISC","name":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-free5gc"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"&gt;The vulnerability has been fixed in the latest version."}],"value":">The vulnerability has been fixed in the latest version."}],"credits":[{"lang":"en","value":"Edgar Carrillo Egea"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-02 15:15:00","lastModifiedDate":"2023-10-04 17:01:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:free5gc:free5gc:1.1.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}