Cyber Posture

CVE-2026-28281

HighPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
EPSS Score 0.0002 6.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28281 is a high-severity CSRF (CWE-352) vulnerability in Instantcms Instantcms. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-352

Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.

addresses: CWE-352

Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.

addresses: CWE-352

Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.

addresses: CWE-352

Detects anomalous request patterns consistent with cross-site request forgery.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

CSRF in public-facing CMS directly enables remote exploitation of the web app (T1190) delivered via attacker-crafted links/pages requiring user interaction (T1566.002, T1204.001); successful abuse permits unauthorized account changes such as privilege grants (T1098).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

InstantCMS is a free and open source content management system. Prior to 2.18.1, InstantCMS does not validate CSRF tokens, which allows attackers grant moderator privileges to users, execute scheduled tasks, move posts to trash, and accept friend requests on behalf…

more

of the user. This vulnerability is fixed in 2.18.1.

Deeper analysisAI

CVE-2026-28281 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting InstantCMS, a free and open source content management system. In versions prior to 2.18.1, the software fails to validate CSRF tokens, enabling unauthorized actions when a victim is tricked into performing a state-changing operation. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N), indicating network accessibility, low attack complexity, no privileges required, user interaction needed, low confidentiality impact, high integrity impact, and no availability impact.

Unauthenticated attackers can exploit this remotely by crafting malicious web pages or links that, when visited by an authenticated InstantCMS user, trigger forged requests lacking valid CSRF tokens. This allows attackers to perform actions on the victim's behalf, such as granting moderator privileges to arbitrary users, executing scheduled tasks, moving posts to trash, and accepting friend requests.

The vulnerability is addressed in InstantCMS version 2.18.1, which implements proper CSRF token validation. Additional details on the issue and patch are available in the GitHub security advisory at https://github.com/instantsoft/icms2/security/advisories/GHSA-pp43-262q-h73m.

Details

CWE(s)

Affected Products

instantcms
instantcms
≤ 2.18.1

CVEs Like This One

CVE-2013-10051Same product: Instantcms Instantcms
CVE-2025-25154Shared CWE-352
CVE-2025-26963Shared CWE-352
CVE-2025-23577Shared CWE-352
CVE-2025-23990Shared CWE-352
CVE-2025-26550Shared CWE-352
CVE-2024-55076Shared CWE-352
CVE-2025-23661Shared CWE-352
CVE-2026-25812Shared CWE-352
CVE-2026-39640Shared CWE-352

References