An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
History

Tue, 06 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Savignano s-notify
CPEs cpe:2.3:a:savignano:s\/notify:*:*:*:*:*:bitbucket:*:* cpe:2.3:a:savignano:s-notify:*:*:*:*:*:bitbucket:*:*
Vendors & Products Savignano s\/notify
Savignano s-notify

Fri, 18 Apr 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-17T18:00:42.044Z

Reserved: 2023-12-15T00:00:00.000Z

Link: CVE-2023-50931

cve-icon Vulnrichment

Updated: 2024-08-02T22:23:44.073Z

cve-icon NVD

Status : Analyzed

Published: 2024-01-09T07:15:09.877

Modified: 2026-01-06T19:37:56.113

Link: CVE-2023-50931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.