Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23617: Cross-Site Request Forgery (CSRF) in cybio Floatbox Plus

0
Unknown
VulnerabilityCVE-2025-23617cvecve-2025-23617
Published: Thu Jan 16 2025 (01/16/2025, 20:06:22 UTC)
Source: CVE Database V5
Vendor/Project: cybio
Product: Floatbox Plus

Description

Cross-Site Request Forgery (CSRF) vulnerability in cybio Floatbox Plus floatbox-plus allows Stored XSS.This issue affects Floatbox Plus: from n/a through <= 1.4.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:19:00 UTC

Technical Analysis

CVE-2025-23617 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the cybio Floatbox Plus plugin, specifically affecting versions up to 1.4.4. The vulnerability allows attackers to trick authenticated users into submitting unauthorized requests to the vulnerable web application. This CSRF flaw leads to Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are permanently stored on the server and executed in the context of users visiting the affected pages. The exploitation chain involves an attacker crafting a malicious request that, when executed by an authenticated user, causes the injection of persistent malicious scripts. These scripts can hijack user sessions, steal sensitive information, or perform actions on behalf of the user without their consent. The vulnerability does not currently have a CVSS score and no known public exploits exist, but the impact is significant due to the combination of CSRF and stored XSS. The lack of patches or official remediation increases the urgency for organizations to implement compensating controls. The vulnerability primarily affects web applications that integrate the Floatbox Plus plugin for enhanced content display, which is used in various content management systems and websites. The attack requires the victim to be authenticated and to interact with attacker-controlled content, limiting the ease of exploitation but not negating the risk. The absence of authentication bypass or remote code execution reduces the severity but does not eliminate the threat of session compromise and data theft. This vulnerability highlights the importance of robust CSRF protections and input sanitization in web applications.

Potential Impact

The potential impact of CVE-2025-23617 is significant for organizations using the Floatbox Plus plugin. Successful exploitation can lead to persistent XSS attacks, enabling attackers to hijack user sessions, steal cookies, perform unauthorized actions, and potentially escalate privileges within the affected web application. This can compromise the confidentiality and integrity of user data and disrupt normal operations. Organizations with high-value web assets or sensitive user information are at greater risk. The vulnerability could be leveraged to target administrative users, leading to broader system compromise. Additionally, the stored nature of the XSS means that all users accessing the infected content are at risk, amplifying the scope of impact. The lack of current exploits reduces immediate risk but does not diminish the potential for future attacks once exploit code becomes available. The vulnerability could also damage organizational reputation and lead to regulatory compliance issues if sensitive data is exposed. Overall, the impact spans confidentiality, integrity, and availability, with a focus on user session security and data protection.

Mitigation Recommendations

To mitigate CVE-2025-23617, organizations should take immediate and specific actions beyond generic advice: 1) Temporarily disable the Floatbox Plus plugin until an official patch is released to eliminate the attack surface. 2) Implement strict anti-CSRF tokens and verify their presence on all state-changing requests to prevent unauthorized actions. 3) Conduct thorough input validation and output encoding to prevent stored XSS payloads from executing. 4) Review and harden Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. 5) Monitor web application logs for unusual POST requests or suspicious activity indicative of CSRF or XSS attempts. 6) Educate users, especially administrators, about the risks of interacting with untrusted links or content. 7) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected systems. 8) Consider web application firewalls (WAF) with custom rules to detect and block CSRF and XSS attack patterns targeting Floatbox Plus. These targeted measures will reduce the likelihood of exploitation and limit damage if an attack occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:27:15.896Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7640e6bfc5ba1df0ac06

Added to database: 4/1/2026, 7:47:12 PM

Last enriched: 4/2/2026, 11:19:00 AM

Last updated: 4/6/2026, 9:30:27 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses