{"api_version":"1","generated_at":"2026-04-22T20:07:33+00:00","cve":"CVE-2026-30878","urls":{"html":"https://cve.report/CVE-2026-30878","api":"https://cve.report/api/cve/CVE-2026-30878.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-30878","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-30878"},"summary":{"title":"baserCMS: Mail Form Acceptance Bypass via Public API","description":"baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-31 01:16:35","updated_at":"2026-04-01 20:28:15"},"problem_types":["CWE-285","CWE-285 CWE-285: Improper Authorization"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3","name":"https://github.com/baserproject/basercms/releases/tag/5.2.3","refsource":"security-advisories@github.com","tags":["Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","name":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://basercms.net/security/JVN_20837860","name":"https://basercms.net/security/JVN_20837860","refsource":"security-advisories@github.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-30878","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-30878","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"baserproject","product":"basercms","version":"affected < 5.2.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"30878","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"basercms","cpe5":"basercms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"30878","cve":"CVE-2026-30878","epss":"0.000400000","percentile":"0.119800000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-30878","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-31T18:39:51.414757Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-31T19:09:18.507Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"basercms","vendor":"baserproject","versions":[{"status":"affected","version":"< 5.2.3"}]}],"descriptions":[{"lang":"en","value":"baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285: Improper Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-31T00:45:21.294Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c"},{"name":"https://basercms.net/security/JVN_20837860","tags":["x_refsource_MISC"],"url":"https://basercms.net/security/JVN_20837860"},{"name":"https://github.com/baserproject/basercms/releases/tag/5.2.3","tags":["x_refsource_MISC"],"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3"}],"source":{"advisory":"GHSA-8cr7-r8qw-gp3c","discovery":"UNKNOWN"},"title":"baserCMS: Mail Form Acceptance Bypass via Public API"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-30878","datePublished":"2026-03-31T00:45:21.294Z","dateReserved":"2026-03-06T00:04:56.699Z","dateUpdated":"2026-03-31T19:09:18.507Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-31 01:16:35","lastModifiedDate":"2026-04-01 20:28:15","problem_types":["CWE-285","CWE-285 CWE-285: Improper Authorization"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.2.3","matchCriteriaId":"07DEEEF3-0621-431D-8A38-405EDBD0957E"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"30878","Ordinal":"1","Title":"baserCMS: Mail Form Acceptance Bypass via Public API","CVE":"CVE-2026-30878","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"30878","Ordinal":"1","NoteData":"baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3.","Type":"Description","Title":"baserCMS: Mail Form Acceptance Bypass via Public API"}]}}}