Cyber Posture

CVE-2025-24900

High

Published: 11 February 2025

Published
11 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0010 28.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-24900 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, affecting Concorde, a federated microblogging platform forked from Misskey and formerly known as Nexkey. The issue stems from a lack of CSRF countermeasures and improper cookie settings for MediaProxy authentication, specifically the absence of the SameSite attribute on the authentication cookie in versions prior to 12.25Q1.1. This allows attackers to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. Additionally, in versions prior to 12.24Q2.3, the same cookie authenticates the job queue management page (bull-board), enabling its bypass as well. The vulnerability carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).

Any unauthenticated attacker with network access can exploit this vulnerability without user interaction, as it requires no privileges and has a changed scope. Successful exploitation allows bypassing MediaProxy restrictions to load arbitrary images, potentially enabling attacks with significant impact on availability and integrity. For affected bull-board versions, attackers gain unauthorized access to job queue management, further amplifying denial-of-service or manipulation risks.

The Concorde maintainers state that affected versions are too old to be covered by the advisory but strongly recommend against their use. Version 12.25Q1.1 includes a patch addressing the SameSite cookie issue for MediaProxy, with an additional fix in a later commit for bull-board authentication. No effective workaround exists other than updating, as detailed in the GitHub security advisory (GHSA-5hgq-9vw8-7v87) and related commits.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a CSRF vulnerability in a public-facing web application (Concorde federated platform) that can be directly exploited by unauthenticated remote attackers to bypass authentication controls on MediaProxy and bull-board endpoints, matching the definition of T1190 for exploiting public-facing applications to achieve impacts like availability disruption.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References