WS-2020-0137
Published:May 14, 2026
Updated:May 14, 2026
Impact CSRF vulnerability: In some very specific circumstances, an attacker would be able to update your settings. Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings. Patches As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie. For more information If you have any questions or comments about this advisory: * Open an issue in "Polaris-React" (https://github.com/polaris-rbx/polaris-react) * Email us at "hi@nezto.re" (mailto:hi@nezto.re) * Join our discord (preferred): https://discord.gg/QevWabU
Related Resources (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Cross-Site Request Forgery (CSRF)