RT is an open source, enterprise-grade issue and ticket tracking system. Versions 6.0.0 through 6.0.2 contain a Cross-Site Request Forgery (CSRF) vulnerability. An attacker who can induce a logged-in RT user to visit a malicious web page can trigger arbitrary state-changing actions in RT on that user's behalf. This issue has been fixed in version 6.0.3.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bestpractical
Bestpractical rt |
|
| Vendors & Products |
Bestpractical
Bestpractical rt |
Fri, 22 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RT is an open source, enterprise-grade issue and ticket tracking system. Versions 6.0.0 through 6.0.2 contain a Cross-Site Request Forgery (CSRF) vulnerability. An attacker who can induce a logged-in RT user to visit a malicious web page can trigger arbitrary state-changing actions in RT on that user's behalf. This issue has been fixed in version 6.0.3. | |
| Title | RT has broken CSRF protection for authenticated users | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-22T21:12:41.473Z
Reserved: 2026-04-16T16:43:03.175Z
Link: CVE-2026-41074
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-22T22:30:02Z
Weaknesses