CVE-2025-22963
Published: 13 January 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-22963, published on 2025-01-13, is a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in Teedy through version 1.11. The issue enables account takeover through a POST request to the /api/user/admin endpoint, with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this by tricking a logged-in user into performing an action, such as visiting a malicious webpage (UI:R), despite the high attack complexity (AC:H). Successful exploitation allows full account takeover, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) with no change in scope (S:U).
Mitigation guidance and patches are detailed in the provided references, including the Teedy blog at https://blog.teedy.io/, analysis at https://github.com/samplev45/CVE-2025-22963, release notes for v1.11 at https://github.com/sismics/docs/releases/tag/v1.11, and a proof-of-concept at https://github.com/sota70/teedy-v1.11-csrf. Practitioners should consult these for upgrade paths beyond version 1.11.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CSRF vulnerability (CVE-2025-22963) in Teedy enables exploitation of a public-facing web application via POST /api/user/admin, allowing remote attackers to perform unauthorized account modifications (e.g., password changes) on authenticated users, leading to account takeover.