Cyber Posture

CVE-2025-25907

HighPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
21 May 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25907, published on 2025-03-10, is a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) affecting tianti version 2.3 in the /user/ajax/save component. This flaw enables attackers to execute arbitrary operations via a crafted GET or POST request. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H), reflecting high severity due to its potential for significant impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited by unauthenticated attackers (PR:N) accessible over the network (AV:N) with low attack complexity (AC:L), but it requires user interaction (UI:R), such as tricking a victim into visiting a malicious site or clicking a forged link. Successful exploitation allows attackers to perform unauthorized actions on behalf of the authenticated user, potentially compromising the application's data or functionality with high confidentiality, integrity, and availability impacts.

Mitigation details are available in the referenced GitHub issue at https://github.com/xujeff/tianti/issues/39.

Details

CWE(s)
CWE-352

Affected Products

tianti project
tianti
2.3

MITRE ATT&CK Enterprise Techniques

T1136 Create Account Persistence
Adversaries may create an account to maintain access to victim systems.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CSRF vulnerability in user management endpoints (/user/ajax/save, /user/ajax/upd/status) enables exploitation of public-facing web application (T1190) to perform unauthorized account creation (T1136) and manipulation actions such as add, edit, delete, and restore (T1098) on behalf of authenticated victims via crafted requests.

References