MODx cross-site request forgery vulnerability


MODx, an open source contents management system, contains a cross-site request forgery vulnerability.

Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 2.6 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

  • MODX and earlier


A remote attacker may modify contents managed by MODx if the user views a malicious web page while logged in to MODx.

[Update the software and change the configuration]
Apply the latest update provided by the developer and change the configuration as follows.

* After logging into the MODx administrative page, change the Referer check configuration to [Yes], which is [No] by default.

Users can mitigate this vulnerability by applying the following workarounds.

* Do not click untrusted URL's while logged into MODx administrative page.
* Log out immediately once the administrative operation is completed.

For more information, refer to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2008-5941

  1. JVN : JVN#66828183
  2. National Vulnerability Database (NVD) : CVE-2008-5941
  3. JVN iPedia (Japanese) : JVNDB-2009-000004
Revision History

  • [2009/01/09]
      Web page published