CVE-2026-32817

Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the documents and files module does not verify whether the current user has permission to delete folders or files. The folder_delete and file_delete action handlers in modules/documents-files.php only perform a VIEW authorization check (getFolderForDownload / getFileForDownload) before calling delete(), and they never validate a CSRF token. Because the target UUIDs are read from $_GET, deletion can be triggered by a plain HTTP GET request. When the module is in public mode (documents_files_module_enabled = 1) and a folder is marked public (fol_public = true), an unauthenticated attacker can permanently destroy the entire document library. Even when the module requires login, any user with view-only access can delete content they are only permitted to read. This issue has been fixed in version 5.0.7.
References
Link Resource
https://github.com/Admidio/admidio/security/advisories/GHSA-rmpj-3x5m-9m5f Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 02:16

Updated : 2026-03-23 13:16


NVD link : CVE-2026-32817

Mitre link : CVE-2026-32817

CVE.ORG link : CVE-2026-32817


JSON object : View

Products Affected

admidio

  • admidio
CWE
CWE-862

Missing Authorization