{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PHP Point of Sale","vendor":"PHP Point of Sale LLC","versions":[{"status":"affected","version":"0"}]}],"datePublic":"2022-10-28T13:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(254, 254, 254);\">The application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts.</span>\n\n"}],"value":"\nThe application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts.\n\n"}],"impacts":[{"capecId":"CAPEC-62","descriptions":[{"lang":"en","value":"CAPEC-62 Cross Site Request Forgery"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"07aac9b9-e3e9-4d03-a447-764bd31371d7","shortName":"TML","dateUpdated":"2023-10-25T08:25:37.831Z"},"references":[{"name":"https://www.themissinglink.com.au/security-advisories/cve-2022-40291","url":"https://www.themissinglink.com.au/security-advisories/cve-2022-40291"}],"source":{"discovery":"EXTERNAL"},"title":"Cross-site request forgery (CSRF) in PHP Point of Sale version 19.0, by PHP Point of Sale, LLC","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:14:39.955Z"},"title":"CVE Program Container","references":[{"name":"https://www.themissinglink.com.au/security-advisories/cve-2022-40291","url":"https://www.themissinglink.com.au/security-advisories/cve-2022-40291","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-06T19:19:24.938738Z","id":"CVE-2022-40291","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-06T19:19:48.448Z"}}]},"cveMetadata":{"assignerOrgId":"07aac9b9-e3e9-4d03-a447-764bd31371d7","cveId":"CVE-2022-40291","serial":1,"state":"PUBLISHED","dateUpdated":"2025-05-06T19:19:48.448Z","dateReserved":"2022-09-08T00:00:00.000Z","datePublished":"2022-10-31T20:06:41.873Z","assignerShortName":"TML"},"dataType":"CVE_RECORD","dataVersion":"5.1"}