CVE-2025-0669: CWE-352 Cross-Site Request Forgery (CSRF) in BOINC BOINC Server
Cross-Site Request Forgery (CSRF) vulnerability in BOINC Server allows Cross Site Request Forgery.This issue affects BOINC Server: before 1.4.3.
AI Analysis
Technical Summary
CVE-2025-0669 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting BOINC Server versions prior to 1.4.3. BOINC (Berkeley Open Infrastructure for Network Computing) Server is a platform used to manage distributed computing projects, allowing volunteers to contribute computing resources. The vulnerability arises because the server does not adequately verify that requests originate from authenticated and intended users, enabling an attacker to trick a logged-in user into executing unwanted actions on the server via crafted web requests. The CVSS 4.0 score of 8.6 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The impact on confidentiality and integrity is high (VC:H, VI:H), while availability impact is none (VA:N). The scope is limited (SC:L), and there is no requirement for authentication (AT:N). This means an attacker can remotely induce a victim to perform unauthorized state-changing operations on the BOINC Server, potentially manipulating project data or user configurations without their consent. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where BOINC Server is used to coordinate critical distributed computing tasks. The lack of patch links indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation.
Potential Impact
For European organizations utilizing BOINC Server, this CSRF vulnerability poses a substantial risk to the integrity and confidentiality of distributed computing projects. Attackers could manipulate project parameters, alter user data, or disrupt the coordination of computational tasks, potentially skewing research results or causing resource misallocation. Given the collaborative and often scientific nature of BOINC projects, such interference could undermine trust in research outputs or delay critical computations. Additionally, unauthorized actions performed via CSRF could lead to privilege escalation if combined with other vulnerabilities or misconfigurations. The impact is particularly relevant for academic institutions, research centers, and organizations involved in large-scale distributed computing initiatives across Europe. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility mean that unpatched servers remain vulnerable to targeted or opportunistic attacks.
Mitigation Recommendations
European organizations should immediately verify their BOINC Server versions and upgrade to version 1.4.3 or later once available. Until patches are released, implement strict CSRF protections such as enforcing anti-CSRF tokens on all state-changing requests and validating the Origin and Referer headers to ensure requests originate from trusted sources. Employ web application firewalls (WAFs) configured to detect and block suspicious cross-site requests targeting BOINC Server endpoints. Restrict administrative access to the BOINC Server interface via network segmentation and VPNs to limit exposure. Educate users about the risks of clicking on untrusted links while authenticated to BOINC Server. Regularly audit server logs for unusual request patterns indicative of CSRF attempts. Finally, monitor official BOINC and NCSC.ch advisories for patch releases and promptly apply updates to remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Italy
CVE-2025-0669: CWE-352 Cross-Site Request Forgery (CSRF) in BOINC BOINC Server
Description
Cross-Site Request Forgery (CSRF) vulnerability in BOINC Server allows Cross Site Request Forgery.This issue affects BOINC Server: before 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-0669 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting BOINC Server versions prior to 1.4.3. BOINC (Berkeley Open Infrastructure for Network Computing) Server is a platform used to manage distributed computing projects, allowing volunteers to contribute computing resources. The vulnerability arises because the server does not adequately verify that requests originate from authenticated and intended users, enabling an attacker to trick a logged-in user into executing unwanted actions on the server via crafted web requests. The CVSS 4.0 score of 8.6 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The impact on confidentiality and integrity is high (VC:H, VI:H), while availability impact is none (VA:N). The scope is limited (SC:L), and there is no requirement for authentication (AT:N). This means an attacker can remotely induce a victim to perform unauthorized state-changing operations on the BOINC Server, potentially manipulating project data or user configurations without their consent. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where BOINC Server is used to coordinate critical distributed computing tasks. The lack of patch links indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation.
Potential Impact
For European organizations utilizing BOINC Server, this CSRF vulnerability poses a substantial risk to the integrity and confidentiality of distributed computing projects. Attackers could manipulate project parameters, alter user data, or disrupt the coordination of computational tasks, potentially skewing research results or causing resource misallocation. Given the collaborative and often scientific nature of BOINC projects, such interference could undermine trust in research outputs or delay critical computations. Additionally, unauthorized actions performed via CSRF could lead to privilege escalation if combined with other vulnerabilities or misconfigurations. The impact is particularly relevant for academic institutions, research centers, and organizations involved in large-scale distributed computing initiatives across Europe. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility mean that unpatched servers remain vulnerable to targeted or opportunistic attacks.
Mitigation Recommendations
European organizations should immediately verify their BOINC Server versions and upgrade to version 1.4.3 or later once available. Until patches are released, implement strict CSRF protections such as enforcing anti-CSRF tokens on all state-changing requests and validating the Origin and Referer headers to ensure requests originate from trusted sources. Employ web application firewalls (WAFs) configured to detect and block suspicious cross-site requests targeting BOINC Server endpoints. Restrict administrative access to the BOINC Server interface via network segmentation and VPNs to limit exposure. Educate users about the risks of clicking on untrusted links while authenticated to BOINC Server. Regularly audit server logs for unusual request patterns indicative of CSRF attempts. Finally, monitor official BOINC and NCSC.ch advisories for patch releases and promptly apply updates to remediate the vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NCSC.ch
- Date Reserved
- 2025-01-23T09:00:46.523Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9927
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 1:58:52 PM
Last updated: 1/7/2026, 6:10:14 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.