← Advisories

Pachno 1.0.6 Cross-Site Request Forgery

High
Advisory ID
ZSL-2026-5983
Release Date
12 April 2026
Vendor
Daniel André Eikeland - https://github.com/pachno/pachno
Affected Version
1.0.6
CVE
N/A
Tested On
GNU/Linux, Apache2, PHP/7.4, MySQL/5.7 (MariaDB)
Summary

Pachno is an open-source collaboration platform (formerly known as The Bug Genie) designed for team project management, issue tracking, and documentation. It offers a module-based, customizable environment for software development and team workflows, distributed under the Mozilla Public License.

Description

CSRF protection in the application is opt-in via the @CsrfProtected annotation and the csrf_enabled route flag, both of which are absent from a large set of state-changing endpoints including login, registration, logout, file upload, milestone editing, group/role/team/client/user administration, and Livelink commit posting. No same-origin enforcement, anti-CSRF token, or SameSite=Strict cookie attribute is in place to compensate. This can be exploited to perform arbitrary actions in context of an authenticated user, including forced logout, account creation by an admin, role modification, comment injection, and file upload. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Proof of Concept
Disclosure Timeline
06.04.2026Vulnerability discovered.
09.04.2026Vendor contacted.
11.04.2026No response from the vendor.
12.04.2026Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
N/A
Changelog
12.04.2026Initial release