CVE-2025-22963: CWE-352 Cross-Site Request Forgery (CSRF) in Sismics Teedy
Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.
AI Analysis
Technical Summary
CVE-2025-22963 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Sismics Teedy, an open-source document management system, in versions up to 1.11. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the POST /api/user/admin endpoint. Specifically, this endpoint can be used to take over accounts by modifying administrative user data without proper anti-CSRF protections. The CVSS 3.1 score of 7.5 reflects the network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and user interaction required (UI:R). The impact on confidentiality, integrity, and availability is high, as an attacker can gain administrative control, potentially leading to full system compromise, data exfiltration, or disruption of services. The vulnerability does not require prior authentication but does require the victim to interact with a malicious link or webpage, making social engineering a key component of exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using Teedy should prioritize mitigation and monitoring. The vulnerability is categorized under CWE-352, which highlights weaknesses in CSRF protections that fail to verify the legitimacy of state-changing requests.
Potential Impact
For European organizations using Sismics Teedy, this vulnerability poses a significant risk. Given Teedy's role in managing sensitive documents and administrative user accounts, exploitation could lead to unauthorized access to confidential data, manipulation or deletion of documents, and disruption of business operations. Organizations in sectors such as government, finance, healthcare, and legal services, where document integrity and confidentiality are critical, are particularly at risk. The ability to take over administrative accounts could allow attackers to bypass other security controls, escalate privileges, and move laterally within networks. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. The requirement for user interaction means phishing campaigns or malicious websites could be used as attack vectors, emphasizing the need for user awareness and technical controls. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation would have serious consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately review and restrict access to the /api/user/admin endpoint, limiting it to trusted IP ranges or VPNs where feasible. 2) Implement robust anti-CSRF tokens in all state-changing requests, ensuring that the server validates these tokens before processing. 3) Enforce strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. 4) Educate users about the risks of phishing and the importance of not clicking on suspicious links, as user interaction is required for exploitation. 5) Monitor logs for unusual POST requests to the vulnerable endpoint, especially those originating from unexpected sources or with anomalous payloads. 6) If possible, isolate Teedy instances in segmented network zones to limit lateral movement in case of compromise. 7) Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider implementing Web Application Firewalls (WAF) with rules to detect and block CSRF attack patterns targeting the affected endpoint.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-22963: CWE-352 Cross-Site Request Forgery (CSRF) in Sismics Teedy
Description
Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.
AI-Powered Analysis
Technical Analysis
CVE-2025-22963 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Sismics Teedy, an open-source document management system, in versions up to 1.11. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the POST /api/user/admin endpoint. Specifically, this endpoint can be used to take over accounts by modifying administrative user data without proper anti-CSRF protections. The CVSS 3.1 score of 7.5 reflects the network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and user interaction required (UI:R). The impact on confidentiality, integrity, and availability is high, as an attacker can gain administrative control, potentially leading to full system compromise, data exfiltration, or disruption of services. The vulnerability does not require prior authentication but does require the victim to interact with a malicious link or webpage, making social engineering a key component of exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using Teedy should prioritize mitigation and monitoring. The vulnerability is categorized under CWE-352, which highlights weaknesses in CSRF protections that fail to verify the legitimacy of state-changing requests.
Potential Impact
For European organizations using Sismics Teedy, this vulnerability poses a significant risk. Given Teedy's role in managing sensitive documents and administrative user accounts, exploitation could lead to unauthorized access to confidential data, manipulation or deletion of documents, and disruption of business operations. Organizations in sectors such as government, finance, healthcare, and legal services, where document integrity and confidentiality are critical, are particularly at risk. The ability to take over administrative accounts could allow attackers to bypass other security controls, escalate privileges, and move laterally within networks. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. The requirement for user interaction means phishing campaigns or malicious websites could be used as attack vectors, emphasizing the need for user awareness and technical controls. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation would have serious consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately review and restrict access to the /api/user/admin endpoint, limiting it to trusted IP ranges or VPNs where feasible. 2) Implement robust anti-CSRF tokens in all state-changing requests, ensuring that the server validates these tokens before processing. 3) Enforce strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. 4) Educate users about the risks of phishing and the importance of not clicking on suspicious links, as user interaction is required for exploitation. 5) Monitor logs for unusual POST requests to the vulnerable endpoint, especially those originating from unexpected sources or with anomalous payloads. 6) If possible, isolate Teedy instances in segmented network zones to limit lateral movement in case of compromise. 7) Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider implementing Web Application Firewalls (WAF) with rules to detect and block CSRF attack patterns targeting the affected endpoint.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6896070dad5a09ad0004626d
Added to database: 8/8/2025, 2:17:49 PM
Last enriched: 8/16/2025, 1:04:27 AM
Last updated: 8/16/2025, 1:04:27 AM
Views: 17
Related Threats
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.