PatchSiren

PatchSiren cyber security CVE debrief

CVE-2020-37241 Bloofox CVE debrief

CVE-2020-37241 describes a cross-site request forgery issue in bloofoxCMS 0.5.2.1. If an authenticated administrator visits a malicious page, an attacker can cause unwanted administrative actions, including adding a new admin account with attacker-chosen credentials. NVD and the supplied VulnCheck references associate the issue with CWE-352 and cite the bloofoxCMS 0.5.2.1 release and an advisory/exploit reference set.

Vendor
Bloofox
Product
Unknown
CVSS
MEDIUM 6.9
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-16
Original CVE updated
2026-05-16
Advisory published
2026-05-16
Advisory updated
2026-05-16

Who should care

Organizations running bloofoxCMS 0.5.2.1, especially teams that rely on browser-based admin workflows. Security, web application, and platform administrators should care because CSRF can turn a single logged-in session into unauthorized configuration or account changes.

Technical summary

The vulnerability is a CSRF weakness: the application does not adequately ensure that state-changing administrative requests are intentionally initiated by the logged-in user. According to the supplied description, attackers can use hidden forms aimed at the admin user creation endpoint to create new administrative accounts without explicit consent. The NVD data maps this to CWE-352 and lists the issue as network-exploitable with no privileges or user interaction required beyond the victim loading the malicious page.

Defensive priority

High for any exposed bloofoxCMS deployment with administrative access available in a browser. Even though the CVSS severity is listed as Medium (6.9), the impact is sensitive because it can result in unauthorized admin account creation and subsequent control of the CMS.

Recommended defensive actions

  • Upgrade or replace the affected bloofoxCMS version if a fixed release is available from the vendor or project release channel referenced in the source corpus.
  • Verify that all state-changing admin actions require robust CSRF protections, such as per-request tokens validated server-side.
  • Ensure administrative endpoints enforce same-site protections and reject unauthenticated or cross-origin state changes.
  • Review existing administrator accounts for unexpected additions or privilege changes.
  • Limit exposure of admin interfaces and enforce strong authentication controls, including MFA where supported.
  • Use browser and reverse-proxy controls that reduce cross-site request risk, but do not rely on them as the primary mitigation.

Evidence notes

The supplied source corpus identifies CVE-2020-37241 as a CSRF issue in bloofoxCMS 0.5.2.1, with CWE-352 listed in the NVD metadata. The description explicitly states that hidden forms can target the admin user creation endpoint to add new administrative accounts. Timing context comes from the CVE/NVD publish and modify timestamps supplied in the record: 2026-05-16T16:16:20.350Z. Resource references include the CVE record, NVD detail page, the bloofoxCMS 0.5.2.1 release tag, the project website, an Exploit-DB entry, and a VulnCheck advisory.

Official resources

Public vulnerability record and NVD metadata published/modified on 2026-05-16 identify CVE-2020-37241 as a CSRF flaw in bloofoxCMS 0.5.2.1. The supplied references include the affected release tag, project website, Exploit-DB, and a VulnChe