Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio

0
Low
VulnerabilityCVE-2025-13871cvecve-2025-13871cwe-352
Published: Tue Dec 02 2025 (12/02/2025, 09:42:51 UTC)
Source: CVE Database V5
Vendor/Project: ObjectPlanet
Product: Opinio

Description

Cross-Site Request Forgery (CSRF) in the resource-management feature of ObjectPlanet Opinio 7.26 rev12562 allows to upload files on behalf of the connected users and then access such files without authentication.

AI-Powered Analysis

AILast updated: 12/09/2025, 10:54:40 UTC

Technical Analysis

CVE-2025-13871 identifies a Cross-Site Request Forgery (CSRF) vulnerability in ObjectPlanet Opinio version 7.26 rev12562, specifically within its resource-management feature. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are logged in. In this case, the flaw enables an attacker to upload files on behalf of the connected user without their knowledge or consent. Once uploaded, these files can be accessed without requiring authentication, potentially exposing sensitive or confidential information. The vulnerability does not require the attacker to have prior authentication or elevated privileges but does require the victim to interact with a maliciously crafted webpage or link (user interaction). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality and integrity (CI:L), with no impact on availability. The lack of authentication for accessing uploaded files increases the risk of unauthorized data exposure. Although no public exploits are currently known, the vulnerability poses a risk to environments where Opinio is used for resource management and file handling. The absence of patch links suggests that a fix might not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized file uploads and subsequent data exposure, undermining confidentiality and potentially enabling further attacks such as malware distribution or data leakage. Organizations relying on ObjectPlanet Opinio for managing sensitive documents or resources are at risk of having unauthorized files introduced into their systems, which could be accessed by unauthorized parties without authentication. This could affect sectors such as government, finance, healthcare, and critical infrastructure where Opinio is deployed. The low CVSS score reflects limited direct impact, but the ability to upload files without authentication and access them poses a significant risk in environments with sensitive data. Additionally, the requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. The impact is heightened in organizations with lax monitoring of file uploads or insufficient access controls on uploaded content.

Mitigation Recommendations

To mitigate CVE-2025-13871, organizations should implement strict anti-CSRF protections such as synchronizer tokens or double-submit cookies within the Opinio application, especially on resource-management and file upload functionalities. Restrict file upload permissions to only trusted users and validate file types and sizes rigorously to prevent malicious content. Configure access controls to require authentication before accessing uploaded files, eliminating anonymous access. Monitor logs for unusual file upload activity and implement web application firewalls (WAFs) with rules to detect and block CSRF attempts. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. If possible, upgrade to a patched version once available or apply vendor-recommended workarounds. Network segmentation and limiting exposure of the Opinio application to trusted networks can further reduce risk. Regular security assessments and penetration testing should verify the effectiveness of these controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2025-12-02T09:16:58.809Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692eb8375ae7112264a43086

Added to database: 12/2/2025, 9:58:15 AM

Last enriched: 12/9/2025, 10:54:40 AM

Last updated: 1/16/2026, 10:13:27 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats