{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-30878","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-06T00:04:56.699Z","datePublished":"2026-03-31T00:45:21.294Z","dateUpdated":"2026-03-31T19:09:18.507Z"},"containers":{"cna":{"title":"baserCMS: Mail Form Acceptance Bypass via Public API","problemTypes":[{"descriptions":[{"cweId":"CWE-285","lang":"en","description":"CWE-285: Improper Authorization","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c"},{"name":"https://basercms.net/security/JVN_20837860","tags":["x_refsource_MISC"],"url":"https://basercms.net/security/JVN_20837860"},{"name":"https://github.com/baserproject/basercms/releases/tag/5.2.3","tags":["x_refsource_MISC"],"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3"}],"affected":[{"vendor":"baserproject","product":"basercms","versions":[{"version":"< 5.2.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-31T00:45:21.294Z"},"descriptions":[{"lang":"en","value":"baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3."}],"source":{"advisory":"GHSA-8cr7-r8qw-gp3c","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-8cr7-r8qw-gp3c","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T18:39:51.414757Z","id":"CVE-2026-30878","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T19:09:18.507Z"}}]}}