CIRCL Vulnerability-Lookup में CSRF भेद्यता

प्लेटफ़ॉर्म

other

घटक

vulnerability-lookup

में ठीक किया गया

2.18.0

AI Confidence: highNVDEPSS 0.0%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2025-42616 describes a Cross-Site Request Forgery (CSRF) vulnerability discovered in Vulnerability-Lookup. This flaw allows attackers to perform unauthorized actions on behalf of authenticated users by crafting malicious GET requests. The vulnerability impacts versions 0.0 through 2.18.0, and a fix is available in version 2.18.0.

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

The primary impact of this CSRF vulnerability lies in the potential for unauthorized modification of application state. An attacker could leverage this flaw to alter database entries, user data, or configurations within Vulnerability-Lookup. Successful exploitation requires the attacker to trick a logged-in user into visiting a malicious website or clicking a crafted link. The attacker's GET request, originating from the user's browser within their authenticated session, would be treated as legitimate by the server, leading to unintended consequences. This could result in data breaches, privilege escalation, or disruption of service, depending on the specific actions accessible via the vulnerable GET endpoints.

शोषण संदर्भअनुवाद हो रहा है…

Public details regarding active exploitation of CVE-2025-42616 are currently unavailable. The vulnerability has been publicly disclosed on 2025-12-08. The EPSS score is pending evaluation. No known public proof-of-concept exploits have been released at this time.

कौन जोखिम में हैअनुवाद हो रहा है…

Organizations utilizing Vulnerability-Lookup in environments where user authentication is critical and state-changing operations are performed via GET requests are at risk. This includes deployments with custom integrations or extensions that may not have been thoroughly reviewed for CSRF vulnerabilities.

हमले की समयरेखा

  1. Disclosure

    disclosure

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO

EPSS

0.03% (7% शतमक)

CISA SSVC

शोषणnone
स्वचालनीयno
तकनीकी प्रभावtotal

प्रभावित सॉफ्टवेयर

घटकvulnerability-lookup
विक्रेताCIRCL
प्रभावित श्रेणीमें ठीक किया गया
0 – 2.18.02.18.0

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. EPSS अद्यतन

शमन और वर्कअराउंडअनुवाद हो रहा है…

The recommended mitigation for CVE-2025-42616 is to immediately upgrade Vulnerability-Lookup to version 2.18.0 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as adding CSRF tokens to all state-changing GET requests. Web Application Firewalls (WAFs) configured to detect and block suspicious GET requests originating from untrusted sources can also provide a layer of protection. Review all GET requests that modify application state and ensure proper CSRF protection is in place. After upgrade, confirm by attempting to trigger a state-changing action via a GET request from an unauthenticated session; it should be rejected.

कैसे ठीक करें

वल्नरेबिलिटी-लुकअप को संस्करण 2.18.0 या उच्चतर में अपडेट करें। यह संस्करण एप्लिकेशन स्टेट को संशोधित करने वाले सभी एंडपॉइंट के लिए HTTP POST अनुरोधों और मान्य CSRF टोकन की आवश्यकता के माध्यम से CSRF भेद्यता को ठीक करता है। यह दुर्भावनापूर्ण GET अनुरोधों के माध्यम से हमलावरों द्वारा अनधिकृत क्रियाओं को निष्पादित करने से रोकता है।

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2025-42616 — CSRF in Vulnerability-Lookup?

CVE-2025-42616 is a Cross-Site Request Forgery (CSRF) vulnerability in Vulnerability-Lookup allowing attackers to perform actions as authenticated users via malicious GET requests.

Am I affected by CVE-2025-42616 in Vulnerability-Lookup?

If you are using Vulnerability-Lookup versions 0.0 through 2.18.0, you are potentially affected by this CSRF vulnerability.

How do I fix CVE-2025-42616 in Vulnerability-Lookup?

Upgrade Vulnerability-Lookup to version 2.18.0 or later to resolve the vulnerability. Consider temporary workarounds like CSRF tokens if immediate upgrade is not possible.

Is CVE-2025-42616 being actively exploited?

Currently, there are no public reports of active exploitation of CVE-2025-42616.

Where can I find the official Vulnerability-Lookup advisory for CVE-2025-42616?

Refer to the official Vulnerability-Lookup project's advisory channels for the latest information and updates regarding CVE-2025-42616.

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।