CVE-2026-40174 PUBLISHED

Masa CMS CSRF in user address management allows unauthorized address changes

Assigner: GitHub_M
Reserved: 09.04.2026 Published: 06.05.2026 Updated: 06.05.2026

Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the cUsers.updateAddress function does not properly validate anti-CSRF tokens for user address management operations.

An attacker can induce a logged-in administrator to submit a forged request that adds, modifies, or deletes user address records, including email addresses and phone numbers. This can be used to alter contact information, redirect organizational communications, and corrupt address data in the user directory. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, restrict access to the administrative backend, use browser isolation for administrative sessions, or deploy filtering rules to block forged requests to the affected endpoint

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor MasaCMS
Product MasaCMS
Versions
  • Version < 7.2.10 is affected
  • Version >= 7.3.0, < 7.3.15 is affected
  • Version >= 7.4.0, < 7.4.10 is affected
  • Version >= 7.5.0, < 7.5.3 is affected

References

Problem Types

  • CWE-352: Cross-Site Request Forgery (CSRF) CWE