CVE-2025-13671: CWE-352 Cross-Site Request Forgery (CSRF) in OpenText™ Web Site Management Server
Cross-Site Request Forgery (CSRF) vulnerability in OpenText™ Web Site Management Server allows Cross Site Request Forgery. The vulnerability could make a user, with active session inside the product, click on a page that contains this malicious HTML triggering to perform changes unconsciously. This issue affects Web Site Management Server: 16.7.0, 16.7.1.
AI Analysis
Technical Summary
CVE-2025-13671 is a Cross-Site Request Forgery (CSRF) vulnerability identified in OpenText™ Web Site Management Server versions 16.7.0 and 16.7.1. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts due to the user's active session. In this case, the vulnerability allows an attacker to craft malicious HTML content that, when visited by a logged-in user, can trigger unauthorized state-changing actions within the Web Site Management Server. The vulnerability requires the victim to have an active session and to interact with the malicious content, such as clicking a link or visiting a webpage containing the exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), low privileges required (PR:L), user interaction required (UI:P), no impact on confidentiality (VC:N), high impact on integrity (VI:H), no impact on availability (VA:N), low scope change (SC:L), no impact on system integrity (SI:N), no scope change (SA:N), partial scope (S:P), no authentication required (AU:N), and unknown impact on resource utilization (R:U), with data confidentiality impact (V:D) and high exploitability (RE:H). This combination results in a medium severity rating with a CVSS score of 5.9. The vulnerability does not currently have known exploits in the wild, but the risk remains significant due to the potential for unauthorized changes to website content or configurations. The root cause is the lack of proper anti-CSRF protections, such as missing or inadequate CSRF tokens or insufficient validation of request origins. This vulnerability falls under CWE-352, which covers CSRF issues. Since OpenText Web Site Management Server is used for managing web content, exploitation could lead to unauthorized content modifications, defacement, or configuration changes that undermine the integrity of web assets.
Potential Impact
The primary impact of CVE-2025-13671 is on the integrity of web content and configurations managed by OpenText Web Site Management Server. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to unauthorized content changes, defacement, or misconfiguration. This can damage organizational reputation, disrupt business operations, and lead to further security issues if malicious content is injected. Confidentiality is not directly impacted, as the vulnerability does not expose sensitive data. Availability is also unaffected. However, the integrity compromise can have cascading effects, such as loss of trust by users and customers, and may facilitate further attacks if attackers insert malicious scripts or links. Organizations relying on this product for critical web content management are at risk of operational disruption and reputational harm. The requirement for user interaction and an active session limits the ease of exploitation but does not eliminate risk, especially in environments with high user activity and exposure to phishing or social engineering attacks.
Mitigation Recommendations
To mitigate CVE-2025-13671, organizations should: 1) Apply any patches or updates provided by OpenText as soon as they become available to address the vulnerability directly. 2) Implement robust anti-CSRF protections, including the use of unique, unpredictable CSRF tokens for all state-changing requests within the Web Site Management Server. 3) Enforce strict validation of the Origin and Referer HTTP headers to ensure requests originate from trusted sources. 4) Educate users about the risks of clicking unknown or suspicious links, especially when logged into sensitive systems. 5) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns. 6) Review and minimize user privileges to limit the impact of compromised sessions. 7) Monitor logs for unusual or unauthorized changes to website content or configurations. 8) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF exploitation. These measures collectively reduce the attack surface and help prevent exploitation even if the vulnerability remains unpatched temporarily.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Netherlands, Japan, South Korea, India
CVE-2025-13671: CWE-352 Cross-Site Request Forgery (CSRF) in OpenText™ Web Site Management Server
Description
Cross-Site Request Forgery (CSRF) vulnerability in OpenText™ Web Site Management Server allows Cross Site Request Forgery. The vulnerability could make a user, with active session inside the product, click on a page that contains this malicious HTML triggering to perform changes unconsciously. This issue affects Web Site Management Server: 16.7.0, 16.7.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-13671 is a Cross-Site Request Forgery (CSRF) vulnerability identified in OpenText™ Web Site Management Server versions 16.7.0 and 16.7.1. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts due to the user's active session. In this case, the vulnerability allows an attacker to craft malicious HTML content that, when visited by a logged-in user, can trigger unauthorized state-changing actions within the Web Site Management Server. The vulnerability requires the victim to have an active session and to interact with the malicious content, such as clicking a link or visiting a webpage containing the exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), low privileges required (PR:L), user interaction required (UI:P), no impact on confidentiality (VC:N), high impact on integrity (VI:H), no impact on availability (VA:N), low scope change (SC:L), no impact on system integrity (SI:N), no scope change (SA:N), partial scope (S:P), no authentication required (AU:N), and unknown impact on resource utilization (R:U), with data confidentiality impact (V:D) and high exploitability (RE:H). This combination results in a medium severity rating with a CVSS score of 5.9. The vulnerability does not currently have known exploits in the wild, but the risk remains significant due to the potential for unauthorized changes to website content or configurations. The root cause is the lack of proper anti-CSRF protections, such as missing or inadequate CSRF tokens or insufficient validation of request origins. This vulnerability falls under CWE-352, which covers CSRF issues. Since OpenText Web Site Management Server is used for managing web content, exploitation could lead to unauthorized content modifications, defacement, or configuration changes that undermine the integrity of web assets.
Potential Impact
The primary impact of CVE-2025-13671 is on the integrity of web content and configurations managed by OpenText Web Site Management Server. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to unauthorized content changes, defacement, or misconfiguration. This can damage organizational reputation, disrupt business operations, and lead to further security issues if malicious content is injected. Confidentiality is not directly impacted, as the vulnerability does not expose sensitive data. Availability is also unaffected. However, the integrity compromise can have cascading effects, such as loss of trust by users and customers, and may facilitate further attacks if attackers insert malicious scripts or links. Organizations relying on this product for critical web content management are at risk of operational disruption and reputational harm. The requirement for user interaction and an active session limits the ease of exploitation but does not eliminate risk, especially in environments with high user activity and exposure to phishing or social engineering attacks.
Mitigation Recommendations
To mitigate CVE-2025-13671, organizations should: 1) Apply any patches or updates provided by OpenText as soon as they become available to address the vulnerability directly. 2) Implement robust anti-CSRF protections, including the use of unique, unpredictable CSRF tokens for all state-changing requests within the Web Site Management Server. 3) Enforce strict validation of the Origin and Referer HTTP headers to ensure requests originate from trusted sources. 4) Educate users about the risks of clicking unknown or suspicious links, especially when logged into sensitive systems. 5) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns. 6) Review and minimize user privileges to limit the impact of compromised sessions. 7) Monitor logs for unusual or unauthorized changes to website content or configurations. 8) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF exploitation. These measures collectively reduce the attack surface and help prevent exploitation even if the vulnerability remains unpatched temporarily.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- OpenText
- Date Reserved
- 2025-11-25T17:03:33.972Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6997966bd7880ec89b39b1bd
Added to database: 2/19/2026, 11:02:03 PM
Last enriched: 2/19/2026, 11:17:17 PM
Last updated: 2/21/2026, 12:18:19 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.