Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15550: Cross-Site Request Forgery (CSRF) in birkir prime

0
Medium
VulnerabilityCVE-2025-15550cvecve-2025-15550
Published: Thu Jan 29 2026 (01/29/2026, 19:41:52 UTC)
Source: CVE Database V5
Vendor/Project: birkir
Product: prime

Description

birkir prime <= 0.4.0.beta.0 contains a cross-site request forgery vulnerability in its GraphQL endpoint that allows attackers to exploit GET-based query requests. Attackers can craft malicious GET requests to trigger unauthorized actions against privileged users by manipulating GraphQL query parameters.

AI-Powered Analysis

AILast updated: 01/29/2026, 20:12:39 UTC

Technical Analysis

CVE-2025-15550 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the birkir prime software, specifically versions up to 0.4.0.beta.0. The vulnerability resides in the GraphQL endpoint, which processes GET-based query requests without adequate CSRF protections. Attackers can exploit this by crafting malicious GET requests that manipulate GraphQL query parameters to trigger unauthorized actions on behalf of authenticated privileged users. Since GraphQL typically allows complex queries and mutations, this flaw can lead to unauthorized state changes or data manipulation. The vulnerability does not require the attacker to have any privileges or authentication, but it does require user interaction, such as the victim visiting a malicious website or clicking a crafted link. The CVSS 4.0 score of 5.1 (medium severity) reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality is negligible, but integrity and availability could be compromised if unauthorized mutations are executed. No patches or known exploits are currently reported, but the presence of this vulnerability highlights the need for improved CSRF defenses in GraphQL implementations. The vulnerability is publicly disclosed and assigned CVE-2025-15550, with no current exploit in the wild.

Potential Impact

For European organizations using birkir prime, this vulnerability poses a moderate risk primarily to the integrity and availability of their systems. Unauthorized actions triggered via CSRF could lead to data manipulation, unauthorized configuration changes, or disruption of services relying on the GraphQL API. Although confidentiality impact is minimal, the ability to perform unauthorized mutations could affect business operations, compliance with data integrity requirements, and trustworthiness of affected applications. Organizations in sectors such as finance, healthcare, or critical infrastructure that rely on birkir prime for backend services could face operational disruptions or reputational damage if exploited. The requirement for user interaction somewhat limits the attack scope, but phishing or social engineering campaigns could facilitate exploitation. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as awareness grows.

Mitigation Recommendations

To mitigate CVE-2025-15550, European organizations should implement the following specific measures: 1) Apply any available patches or updates from the birkir project as soon as they are released. 2) If patches are not yet available, implement strict CSRF protections on the GraphQL endpoint, such as requiring anti-CSRF tokens or enforcing same-site cookie policies. 3) Restrict the GraphQL endpoint to accept only POST requests for mutations and disallow state-changing operations via GET requests. 4) Validate and sanitize all GraphQL query parameters rigorously to detect and block suspicious or malformed requests. 5) Employ Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could trigger CSRF attacks. 6) Educate users about phishing risks and encourage cautious behavior regarding clicking unknown links. 7) Monitor logs for unusual GraphQL query patterns or spikes in GET requests that could indicate exploitation attempts. 8) Consider network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect and block CSRF attack vectors targeting GraphQL endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-29T15:26:44.298Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697bbbbbac06320222b23d98

Added to database: 1/29/2026, 7:57:47 PM

Last enriched: 1/29/2026, 8:12:39 PM

Last updated: 2/6/2026, 5:03:29 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats