Skip to main content

CVE-2025-22963: CWE-352 Cross-Site Request Forgery (CSRF) in Sismics Teedy

High
VulnerabilityCVE-2025-22963cvecve-2025-22963cwe-352
Published: Mon Jan 13 2025 (01/13/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Sismics
Product: Teedy

Description

Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.

AI-Powered Analysis

AILast updated: 08/16/2025, 01:04:27 UTC

Technical Analysis

CVE-2025-22963 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Sismics Teedy, an open-source document management system, in versions up to 1.11. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the POST /api/user/admin endpoint. Specifically, this endpoint can be used to take over accounts by modifying administrative user data without proper anti-CSRF protections. The CVSS 3.1 score of 7.5 reflects the network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and user interaction required (UI:R). The impact on confidentiality, integrity, and availability is high, as an attacker can gain administrative control, potentially leading to full system compromise, data exfiltration, or disruption of services. The vulnerability does not require prior authentication but does require the victim to interact with a malicious link or webpage, making social engineering a key component of exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using Teedy should prioritize mitigation and monitoring. The vulnerability is categorized under CWE-352, which highlights weaknesses in CSRF protections that fail to verify the legitimacy of state-changing requests.

Potential Impact

For European organizations using Sismics Teedy, this vulnerability poses a significant risk. Given Teedy's role in managing sensitive documents and administrative user accounts, exploitation could lead to unauthorized access to confidential data, manipulation or deletion of documents, and disruption of business operations. Organizations in sectors such as government, finance, healthcare, and legal services, where document integrity and confidentiality are critical, are particularly at risk. The ability to take over administrative accounts could allow attackers to bypass other security controls, escalate privileges, and move laterally within networks. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. The requirement for user interaction means phishing campaigns or malicious websites could be used as attack vectors, emphasizing the need for user awareness and technical controls. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation would have serious consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately review and restrict access to the /api/user/admin endpoint, limiting it to trusted IP ranges or VPNs where feasible. 2) Implement robust anti-CSRF tokens in all state-changing requests, ensuring that the server validates these tokens before processing. 3) Enforce strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. 4) Educate users about the risks of phishing and the importance of not clicking on suspicious links, as user interaction is required for exploitation. 5) Monitor logs for unusual POST requests to the vulnerable endpoint, especially those originating from unexpected sources or with anomalous payloads. 6) If possible, isolate Teedy instances in segmented network zones to limit lateral movement in case of compromise. 7) Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider implementing Web Application Firewalls (WAF) with rules to detect and block CSRF attack patterns targeting the affected endpoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6896070dad5a09ad0004626d

Added to database: 8/8/2025, 2:17:49 PM

Last enriched: 8/16/2025, 1:04:27 AM

Last updated: 8/16/2025, 1:04:27 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats