MEDIUMCVE-2026-1745CVSS 4.3

CVE-2026-1745: CSRF in Medical Certificate Generator App

Platform

other

Component

cross-site-request-forgery-arbitrary-medical-certificate-deletion

Fixed in

1.0.1

AI Confidence: mediumNVDEPSS 0.0%Reviewed: May 2026

CVE-2026-1745 is a cross-site request forgery (CSRF) vulnerability affecting SourceCodester Medical Certificate Generator App versions 1.0. This flaw allows an attacker to trick a user into performing unintended actions on the application, potentially leading to unauthorized modifications or data breaches. The vulnerability has been publicly disclosed and may be actively exploited, requiring immediate attention. A patched version is required to resolve this issue.

Impact and Attack Scenarios

A successful CSRF attack against the Medical Certificate Generator App could allow an attacker to perform actions as an authenticated user. This could include generating fraudulent certificates, modifying existing records, or potentially gaining access to sensitive patient data. The impact is amplified if the application is used in a healthcare setting where the integrity of medical records is critical. The publicly disclosed nature of this vulnerability increases the risk of exploitation, as attackers can readily leverage available information to craft malicious requests. The 'unknown part' affected suggests a broad potential attack surface, requiring thorough security review after patching.

Exploitation Context

CVE-2026-1745 has been publicly disclosed, indicating a higher probability of exploitation. The vulnerability is listed on the NVD and CISA advisories. Public proof-of-concept exploits are likely to emerge, making it easier for attackers to leverage this flaw. Given the publicly disclosed nature and the potential impact on sensitive medical data, this vulnerability warrants immediate attention and remediation.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Internet ExposureHigh

EPSS

0.01% (1% percentile)

CISA SSVC

Exploitationpoc
Automatableno
Technical Impactpartial

CVSS Vector

THREAT INTELLIGENCE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R4.3MEDIUMAttack VectorNetworkHow the attacker reaches the targetAttack ComplexityLowConditions required to exploitPrivileges RequiredNoneAuthentication level needed to attackUser InteractionRequiredWhether a victim must take actionScopeUnchangedImpact beyond the vulnerable componentConfidentialityNoneRisk of sensitive data exposureIntegrityLowRisk of unauthorized data modificationAvailabilityNoneRisk of service disruptionnextguardhq.com · CVSS v3.1 Base Score
What do these metrics mean?
Attack Vector
Network — remotely exploitable over the internet. No physical or local access required. Widest attack surface.
Attack Complexity
Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
Privileges Required
None — unauthenticated. No login or credentials needed to exploit.
User Interaction
Required — victim must take an action: open a file, click a link, or visit a crafted page.
Scope
Unchanged — impact is limited to the vulnerable component itself.
Confidentiality
None — no confidentiality impact. Attacker cannot read protected data.
Integrity
Low — attacker can modify some data with limited scope or impact.
Availability
None — no availability impact. Service remains fully operational.

Affected Software

Componentcross-site-request-forgery-arbitrary-medical-certificate-deletion
VendorSourceCodester
Affected rangeFixed in
1.0 – 1.01.0.1

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. Modified
  4. EPSS updated
Unpatched — 111 days since disclosure

Mitigation and Workarounds

The primary mitigation for CVE-2026-1745 is to upgrade to a patched version of the Medical Certificate Generator App as soon as it becomes available. Until a patch is applied, implement temporary mitigations such as enabling a Web Application Firewall (WAF) with CSRF protection rules. Additionally, enforce strict input validation on all user-supplied data to prevent malicious payloads from being injected into requests. Consider implementing anti-CSRF tokens on all sensitive forms and actions within the application. Regularly review application logs for suspicious activity and implement robust access controls to limit the potential impact of a successful attack.

How to fix

Update the Medical Certificate Generator App application to a version that corrects the Cross-Site Request Forgery (CSRF) vulnerability. Implement CSRF protection measures, such as anti-CSRF tokens, on all requests that modify server state. Validate and sanitize user input to prevent injection attacks.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2026-1745 — CSRF in Medical Certificate Generator App?

CVE-2026-1745 is a cross-site request forgery vulnerability in SourceCodester Medical Certificate Generator App version 1.0, allowing attackers to forge requests as authenticated users.

Am I affected by CVE-2026-1745 in Medical Certificate Generator App?

If you are using SourceCodester Medical Certificate Generator App version 1.0, you are potentially affected by this CSRF vulnerability and should prioritize patching.

How do I fix CVE-2026-1745 in Medical Certificate Generator App?

The recommended fix is to upgrade to a patched version of the Medical Certificate Generator App. Until then, implement WAF rules and input validation as temporary mitigations.

Is CVE-2026-1745 being actively exploited?

The vulnerability has been publicly disclosed, increasing the likelihood of active exploitation. Monitor your systems for suspicious activity.

Where can I find the official Medical Certificate Generator App advisory for CVE-2026-1745?

Refer to the SourceCodester website and relevant security advisories (NVD, CISA) for the official advisory regarding CVE-2026-1745.

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.