Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28281: CWE-352: Cross-Site Request Forgery (CSRF) in instantsoft icms2

0
High
VulnerabilityCVE-2026-28281cvecve-2026-28281cwe-352
Published: Mon Mar 09 2026 (03/09/2026, 22:13:24 UTC)
Source: CVE Database V5
Vendor/Project: instantsoft
Product: icms2

Description

InstantCMS is a free and open source content management system. Prior to 2.18.1, InstantCMS does not validate CSRF tokens, which allows attackers grant moderator privileges to users, execute scheduled tasks, move posts to trash, and accept friend requests on behalf of the user. This vulnerability is fixed in 2.18.1.

AI-Powered Analysis

AILast updated: 03/09/2026, 22:48:38 UTC

Technical Analysis

CVE-2026-28281 is a Cross-Site Request Forgery (CSRF) vulnerability identified in InstantCMS (icms2), a free and open-source content management system widely used for building community and social networking websites. Versions prior to 2.18.1 fail to validate CSRF tokens, which are security tokens designed to prevent unauthorized commands from being transmitted from a user that the web application trusts. This lack of validation allows an attacker to craft malicious web requests that, when visited by an authenticated user, can perform sensitive actions without the user's consent. Specifically, attackers can grant themselves or others moderator privileges, execute scheduled tasks that may alter system behavior, move posts to trash thereby manipulating content visibility, and accept friend requests to manipulate social relationships within the platform. The vulnerability requires the victim to interact with a malicious link or webpage (user interaction) but does not require the attacker to have any prior authentication or elevated privileges. The CVSS v3.1 base score is 7.1, reflecting a high severity due to the potential for privilege escalation and integrity compromise, although availability is not impacted. The vulnerability was publicly disclosed on March 9, 2026, and fixed in InstantCMS version 2.18.1. No known exploits have been reported in the wild yet, but the nature of CSRF attacks makes exploitation feasible in typical web environments. The vulnerability is classified under CWE-352, which covers CSRF weaknesses. Organizations running affected versions should prioritize upgrading to the patched release and implement additional CSRF protections such as verifying origin headers and employing same-site cookies.

Potential Impact

The impact of CVE-2026-28281 is significant for organizations using InstantCMS versions prior to 2.18.1. Successful exploitation can lead to unauthorized privilege escalation by granting moderator rights, which can compromise the integrity of the website's content and user management. Attackers can manipulate scheduled tasks, potentially causing unexpected or malicious automated actions. Moving posts to trash disrupts content availability and user experience, while accepting friend requests on behalf of users can be leveraged for social engineering or further attacks within the community. Although availability is not directly affected, the integrity and confidentiality of user data and site management are at risk. This can lead to reputational damage, loss of user trust, and potential regulatory compliance issues for organizations handling personal data. Since exploitation requires only user interaction and no authentication, attackers can target a broad user base, increasing the scope of impact. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a critical threat until patched.

Mitigation Recommendations

To mitigate CVE-2026-28281, organizations should immediately upgrade InstantCMS installations to version 2.18.1 or later, where the vulnerability is fixed. If upgrading is not immediately possible, implement additional CSRF protections such as enforcing strict validation of CSRF tokens on all state-changing requests. Employ the use of SameSite cookies set to 'Strict' or 'Lax' to reduce the risk of CSRF attacks via cross-site requests. Validate the Origin and Referer HTTP headers on sensitive endpoints to ensure requests originate from trusted sources. Educate users about the risks of clicking on suspicious links and encourage the use of security-aware browsing practices. Monitor web server logs and application activity for unusual actions such as unexpected privilege changes or mass friend request acceptances. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns. Regularly audit and review user permissions and scheduled tasks to detect unauthorized modifications. Finally, maintain an up-to-date inventory of CMS versions deployed across the organization to ensure timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af4ae9ea502d3aa8cd9889

Added to database: 3/9/2026, 10:34:17 PM

Last enriched: 3/9/2026, 10:48:38 PM

Last updated: 3/14/2026, 12:02:59 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses