Cyber Posture

CVE-2025-65573

HighPublic PoC

Published: 09 December 2025

Published
09 December 2025
Modified
16 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Cross Site Request Forgery (CSRF) vulnerability in AllskyTeam AllSky v2024.12.06_06 allows remote attackers to cause a denial of service via function handle_interface_POST_and_status.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-23 directly requires mechanisms to authenticate session identifiers and protect against cross-site request forgery (CSRF) attacks like the one in handle_interface_POST_and_status.

prevent

SI-10 mandates validation of information inputs, including anti-CSRF tokens in POST requests to the vulnerable function, blocking forged requests.

prevent

SC-5 limits the effects of denial-of-service attacks triggered by exploitation of the CSRF vulnerability.

Security SummaryAI

CVE-2025-65573 is a Cross Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in AllskyTeam AllSky version v2024.12.06_06. The flaw affects the function handle_interface_POST_and_status, enabling remote attackers to cause a denial of service. Published on 2025-12-09, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, no required privileges, and user interaction needed.

Remote attackers can exploit this CSRF vulnerability by crafting malicious web pages or requests that trick authenticated users into submitting unintended POST requests to the vulnerable handle_interface_POST_and_status function. No prior authentication or privileges are needed on the attacker's part, but the target user must interact (e.g., visit a malicious site) while logged into an affected AllSky instance, resulting in denial of service as described.

Mitigation details and further analysis are available in the primary advisory at https://gh0stmezh.wordpress.com/2025/12/05/cve-2025-65573/ and the AllSky GitHub repository at https://github.com/AllskyTeam/allsky. Relevant source files include https://github.com/AllskyTeam/allsky/blob/master/html/includes/dashboard_LAN.php, https://github.com/AllskyTeam/allsky/blob/master/html/includes/dashboard_WLAN.php, and https://github.com/AllskyTeam/allsky/blob/master/html/includes/functions.php.

Details

CWE(s)

Affected Products

allskyteam
allsky
2024.12.06_06

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-65573 is a CSRF vulnerability in a web application (AllSky), enabling remote exploitation of a public-facing application to perform unauthorized POST requests leading to denial of service.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References