MuraCMS through 10.1.10 contains a CSRF vulnerability that allows attackers to permanently destroy all deleted content stored in the trash system through a simple CSRF attack. The vulnerable cTrash.empty function lacks CSRF token validation, enabling malicious websites to forge requests that irreversibly delete all trashed content when an authenticated administrator visits a crated webpage. Successful exploitation of the CSRF vulnerability results in potentially catastrophic data loss within the MuraCMS system. When an authenticated administrator visits a malicious page containing the CSRF exploit, their browser automatically submits a hidden form that permanently empties the entire trash system without any validation, confirmation dialog, or user consent.
References
| Link | Resource |
|---|---|
| https://docs.murasoftware.com/v10/release-notes/#section-version-1014 | Release Notes |
| https://www.murasoftware.com | Product |
Configurations
History
No history.
Information
Published : 2026-03-18 16:16
Updated : 2026-03-20 18:10
NVD link : CVE-2025-55046
Mitre link : CVE-2025-55046
CVE.ORG link : CVE-2025-55046
JSON object : View
Products Affected
murasoftware
- mura_cms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
