Description

Masa CMS is a content management system forked from Mura CMS. In versions 7.5.2 and earlier, the cUsers.updateAddress function does not properly validate anti-CSRF tokens for user address management operations. An attacker can induce a logged-in administrator to submit a forged request that adds, modifies, or deletes user address records, including email addresses and phone numbers. This can be used to alter contact information, redirect organizational communications, and corrupt address data in the user directory. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, restrict access to the administrative backend, use browser isolation for administrative sessions, or deploy filtering rules to block forged requests to the affected endpoint

INFO

Published Date :

2026-05-06T19:40:23.973Z

Last Modified :

2026-05-07T14:06:18.381Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-40174 vulnerability.

Vendors Products
Masacms
  • Masacms
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40174.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability