CSRF Vulnerability in OpenVPN Monitor by Furlongm
CVE-2021-31604
6.5MEDIUM
Key Information:
- Vendor
- Openvpn-monitor Project
- Status
- Openvpn-monitor
- Vendor
- CVE Published:
- 27 September 2021
Summary
OpenVPN Monitor versions up to 1.1.3 are susceptible to Cross-Site Request Forgery (CSRF) attacks, which can enable unauthorized disconnection of arbitrary clients. This vulnerability poses a significant risk to network integrity and user session management. Attackers may exploit this weakness to disrupt service availability or manipulate client connections. Users of OpenVPN Monitor are advised to implement necessary security measures and update to the latest version to mitigate these risks.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved