Published: 07/06/2021 Updated: 09/06/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross Site Request Forgery (CSRF) in Simple-Log v1.6 allows remote malicious users to gain privilege and execute arbitrary code via the component "Simple-Log/admin/admin.php?act=act_add_member".

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

simple-log project simple-log 1.6

Github Repositories

Use at your own risk CVE-2020-18265 Exploit Windows Binary PoC /CVE-2020-18265exe will run the exploit /CVE-2020-18265exe Target IP /CVE-2020-18265exe wwwexamplecom Running the exploit on Linux Change the target IP in CVE-2020-18265sh then do: chmod +x CVE-2020-18265sh /CVE-2020-18265sh Target IP /CVE-2020-18265sh wwwexam