Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio

0
Low
VulnerabilityCVE-2025-13871cvecve-2025-13871cwe-352
Published: Tue Dec 02 2025 (12/02/2025, 09:42:51 UTC)
Source: CVE Database V5
Vendor/Project: ObjectPlanet
Product: Opinio

Description

CVE-2025-13871 is a Cross-Site Request Forgery (CSRF) vulnerability in ObjectPlanet Opinio version 7. 26 rev12562. This flaw allows an attacker to exploit the resource-management feature to upload files on behalf of authenticated users without their consent. The uploaded files can then be accessed without requiring authentication, potentially exposing sensitive data. The vulnerability requires user interaction and network access but no prior authentication. Although the CVSS score is low (2. 3), the ability to upload and access files without authentication poses a risk of unauthorized data exposure or further exploitation. No known exploits are currently reported in the wild. European organizations using this specific version of Opinio should assess their exposure and apply mitigations promptly. The threat is more relevant for countries with higher adoption of ObjectPlanet Opinio in sectors handling sensitive information.

AI-Powered Analysis

AILast updated: 12/02/2025, 10:13:18 UTC

Technical Analysis

CVE-2025-13871 is a security vulnerability classified as CWE-352 (Cross-Site Request Forgery) affecting ObjectPlanet Opinio version 7.26 rev12562. The vulnerability resides in the resource-management feature, which improperly validates requests to upload files. An attacker can craft a malicious web request that, when visited by an authenticated user, causes the user’s browser to unknowingly upload files on their behalf. These uploaded files are then accessible without requiring authentication, which means an attacker could potentially upload malicious or sensitive files and retrieve them without credentials. The vulnerability does not require the attacker to have prior authentication but does require the victim to interact with a malicious link or webpage. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low impact on integrity (VI:L) with no impact on confidentiality or availability. The lack of authentication for accessing uploaded files increases the risk of unauthorized data exposure. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed to prevent exploitation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized file uploads and access, potentially exposing sensitive or confidential information. Organizations using ObjectPlanet Opinio 7.26 rev12562 in sectors such as government, finance, healthcare, or academia may face increased risk due to the sensitive nature of their data. The ability to upload files without user consent and access them without authentication could be leveraged for data exfiltration, distribution of malware, or staging further attacks within the network. Although the CVSS score is low, the impact on confidentiality and integrity is non-negligible, especially if the uploaded files contain sensitive data or malicious payloads. The requirement for user interaction limits the attack scope but does not eliminate risk, particularly in environments where social engineering or phishing attacks are common. Organizations with web-facing Opinio installations are more exposed, and the lack of authentication on file access could facilitate lateral movement or data leakage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Apply any available patches or updates from ObjectPlanet as soon as they are released. 2) If patches are not yet available, restrict access to the resource-management feature to trusted users and networks only, using network segmentation and access controls. 3) Implement CSRF tokens or other anti-CSRF mechanisms in the web application to validate the legitimacy of file upload requests. 4) Enforce strict file upload validation and sanitization to prevent malicious files from being uploaded. 5) Restrict permissions on uploaded files to require authentication before access, preventing unauthorized retrieval. 6) Monitor logs and network traffic for unusual file upload activity or access patterns. 7) Educate users about the risks of interacting with untrusted links to reduce the likelihood of successful CSRF attacks. 8) Consider deploying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the Opinio application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2025-12-02T09:16:58.809Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692eb8375ae7112264a43086

Added to database: 12/2/2025, 9:58:15 AM

Last enriched: 12/2/2025, 10:13:18 AM

Last updated: 12/2/2025, 11:00:50 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats