Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22582: Cross-Site Request Forgery (CSRF) in Scott Nelle Uptime Robot

0
Unknown
VulnerabilityCVE-2025-22582cvecve-2025-22582
Published: Tue Jan 07 2025 (01/07/2025, 14:57:05 UTC)
Source: CVE Database V5
Vendor/Project: Scott Nelle
Product: Uptime Robot

Description

Cross-Site Request Forgery (CSRF) vulnerability in Scott Nelle Uptime Robot uptime-robot allows Stored XSS.This issue affects Uptime Robot: from n/a through <= 0.1.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:27:59 UTC

Technical Analysis

CVE-2025-22582 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Scott Nelle Uptime Robot software, specifically affecting versions up to and including 0.1.3. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, leveraging the user's credentials and session. In this case, the CSRF flaw facilitates Stored Cross-Site Scripting (XSS), where malicious scripts injected by an attacker are stored on the server and executed in the context of users' browsers when they access affected pages. This combination is particularly dangerous because it can lead to persistent client-side code execution, session hijacking, credential theft, and unauthorized actions within the application. The vulnerability was published in early 2025, with no CVSS score assigned yet and no known exploits in the wild. The affected product, Uptime Robot by Scott Nelle, is a tool used for monitoring website uptime and performance, which may be deployed in various organizational environments. The absence of patches or mitigations at the time of disclosure increases the risk window. The vulnerability likely stems from missing or inadequate anti-CSRF tokens and insufficient input sanitization, allowing attackers to craft malicious requests that are accepted by the server and stored for later execution. This flaw compromises the integrity and confidentiality of user data and can disrupt availability if exploited to perform unauthorized actions.

Potential Impact

The impact of CVE-2025-22582 on organizations can be significant. Successful exploitation enables attackers to perform unauthorized actions on behalf of legitimate users without their consent, potentially leading to persistent XSS attacks. This can result in session hijacking, theft of sensitive information such as authentication tokens or personal data, and manipulation of monitoring configurations. For organizations relying on Uptime Robot to ensure service availability, such attacks could undermine trust in monitoring data and lead to delayed detection of outages or false alerts. Additionally, the stored XSS component can be leveraged to propagate malware or conduct phishing attacks targeting users of the monitoring platform. The lack of authentication bypass or direct remote code execution limits the scope somewhat, but the combination of CSRF and stored XSS still poses a high risk to confidentiality and integrity. The absence of known exploits currently reduces immediate threat but does not diminish the urgency for remediation. Organizations with public-facing monitoring dashboards or multiple users with elevated privileges are particularly vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using affected versions (<= 0.1.3) of Scott Nelle Uptime Robot and plan for immediate upgrade once a patched version is released. In the interim, administrators should restrict access to the monitoring interface to trusted networks and users only, minimizing exposure. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts and malicious payloads can provide temporary protection. Developers should ensure that all state-changing requests require a valid anti-CSRF token and that user inputs are properly sanitized and encoded before storage and rendering to prevent XSS. Regular security assessments and penetration testing focusing on CSRF and XSS vectors are recommended. Monitoring logs for unusual activity and educating users about phishing and social engineering risks can further reduce exploitation likelihood. Finally, maintain close communication with the vendor for timely patch releases and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T10:23:42.744Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75f9e6bfc5ba1df08a74

Added to database: 4/1/2026, 7:46:01 PM

Last enriched: 4/2/2026, 10:27:59 AM

Last updated: 4/6/2026, 11:27:01 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses