Description
Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the documents and files module does not verify whether the current user has permission to delete folders or files. The folder_delete and file_delete action handlers in modules/documents-files.php only perform a VIEW authorization check (getFolderForDownload / getFileForDownload) before calling delete(), and they never validate a CSRF token. Because the target UUIDs are read from $_GET, deletion can be triggered by a plain HTTP GET request. When the module is in public mode (documents_files_module_enabled = 1) and a folder is marked public (fol_public = true), an unauthenticated attacker can permanently destroy the entire document library. Even when the module requires login, any user with view-only access can delete content they are only permitted to read. This issue has been fixed in version 5.0.7.
INFO
Published Date :
2026-03-20T02:01:22.118Z
Last Modified :
2026-03-20T20:02:30.234Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32817 vulnerability.
| Vendors | Products |
|---|---|
| Admidio |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32817.