Cyber Posture

CVE-2025-27910

HighPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
21 May 2025
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may create an account to maintain access to victim systems.

Security Summary

CVE-2025-27910, published on 2025-03-10, is a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in tianti version 2.3, specifically affecting the /user/ajax/upd/status component. The issue enables attackers to execute arbitrary operations via a crafted GET or POST request. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low complexity, and potential for significant impacts on confidentiality, integrity, and availability.

Exploitation targets authenticated users with low privileges who can be socially engineered into performing an action, such as clicking a malicious link or submitting a forged form that triggers the vulnerable endpoint. An attacker does not need direct access but relies on user interaction to forge requests on the victim's behalf, allowing arbitrary operations that could compromise the victim's account or system resources.

Mitigation details are available in the referenced advisory at https://github.com/xujeff/tianti/issues/39.

Details

CWE(s)
CWE-352

Affected Products

tianti project
tianti
2.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1136 Create Account Persistence
Adversaries may create an account to maintain access to victim systems.
Why these techniques?

CSRF vulnerability in user management endpoints (/user/ajax/save, /user/ajax/upd/status) enables exploitation of the web application to perform unauthorized add, edit, delete, and restore operations on accounts, including creating administrator accounts, facilitating account manipulation and creation.

References