Admidio is an open-source user management solution. In versions 5.0.6 and below, the save_membership action in modules/profile/profile_function.php saves changes to a member's role membership start and end dates but does not validate the CSRF token. The handler checks stop_membership and remove_former_membership against the CSRF token but omits save_membership from that check. Because membership UUIDs appear in the HTML source visible to authenticated users, an attacker can embed a crafted POST form on any external page and trick a role leader into submitting it, silently altering membership dates for any member of roles the victim leads. A role leader's session can be silently exploited via CSRF to manipulate any member's membership dates, terminating access by backdating, covertly extending unauthorized access, or revoking role-restricted features, all without confirmation, notification, or administrative approval. This issue has been fixed in version 5.0.7.
References
| Link | Resource |
|---|---|
| https://github.com/Admidio/admidio/releases/tag/v5.0.7 | Product Release Notes |
| https://github.com/Admidio/admidio/security/advisories/GHSA-h8gr-qwr6-m9gx | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 23:16
Updated : 2026-03-23 19:11
NVD link : CVE-2026-32755
Mitre link : CVE-2026-32755
CVE.ORG link : CVE-2026-32755
JSON object : View
Products Affected
admidio
- admidio
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
