Cyber Posture

CVE-2025-22963

High

Published: 13 January 2025

Published
13 January 2025
Modified
07 October 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-22963, published on 2025-01-13, is a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in Teedy through version 1.11. The issue enables account takeover through a POST request to the /api/user/admin endpoint, with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this by tricking a logged-in user into performing an action, such as visiting a malicious webpage (UI:R), despite the high attack complexity (AC:H). Successful exploitation allows full account takeover, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) with no change in scope (S:U).

Mitigation guidance and patches are detailed in the provided references, including the Teedy blog at https://blog.teedy.io/, analysis at https://github.com/samplev45/CVE-2025-22963, release notes for v1.11 at https://github.com/sismics/docs/releases/tag/v1.11, and a proof-of-concept at https://github.com/sota70/teedy-v1.11-csrf. Practitioners should consult these for upgrade paths beyond version 1.11.

Details

CWE(s)
CWE-352

Affected Products

sismics
teedy
≤ 1.11

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CSRF vulnerability (CVE-2025-22963) in Teedy enables exploitation of a public-facing web application via POST /api/user/admin, allowing remote attackers to perform unauthorized account modifications (e.g., password changes) on authenticated users, leading to account takeover.

References