Thanks @emswpuser
First I’ve heard of this and I can see why Patchstack has not notified us directly and discreetly as they normally do when a vulnerability is reported. From the Patchstack link you posted, this appears to be a theoretical report as there is no proof-of-concept. The patchstack link you shared states:
“Solutions –This security issue has a low severity impact and is unlikely to be exploited.“
I’ve reviewed the public advisory which currently contains only a generic CSRF classification with that low severity and no proof-of-concept or affected endpoint. I’ve reached out to Patchstack for exact reproduction steps so we can evaluate and, if needed, issue a fix. If you have any additional technical details (endpoint, parameters, required state), please share so we can verify promptly.
Steve
Hi Steve,
Thank you for the quick reply. I don’t have any other information. I hope Patchstack can provide you with further details.
Thanks.