{ "schema_version": "1.4.0", "id": "GHSA-5925-88xh-6h99", "modified": "2024-04-11T14:40:50Z", "published": "2024-03-21T16:26:35Z", "aliases": [ "CVE-2024-29019" ], "summary": "ESPHome vulnerable to Authentication bypass via Cross site request forgery", "details": "### Summary\nAPI endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete).\n\n### Details\nIt is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against ESPHome, this allows bypassing the authentication for API calls on the platform.\n\n### PoC\nAn example of malicious web page that abuses this vulnerability:\n\n\n\n
\n\t\n\n\t\n\n\t\n \n