All-Dynamics Digital Signage System 2.0.2 contains a cross-site request forgery vulnerability that allows attackers to create administrative users without proper request validation. Attackers can craft a malicious web page that automatically submits forms to create a new user with global administrative privileges when a logged-in user visits the page.
References
| Link | Resource |
|---|---|
| https://www.all-dynamics.de | Product |
| https://www.exploit-db.com/exploits/48736 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/all-dynamics-digital-signage-system-cross-site-request-forgery-via-user-management | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5576.php | Third Party Advisory Exploit |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5576.php | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2026-01-15 17:03
NVD link : CVE-2020-36900
Mitre link : CVE-2020-36900
CVE.ORG link : CVE-2020-36900
JSON object : View
Products Affected
all-dynamics
- digital_signage_system
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
