Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23690: Cross-Site Request Forgery (CSRF) in ArtkanMedia Book a Place

0
Unknown
VulnerabilityCVE-2025-23690cvecve-2025-23690
Published: Thu Jan 16 2025 (01/16/2025, 20:06:41 UTC)
Source: CVE Database V5
Vendor/Project: ArtkanMedia
Product: Book a Place

Description

Cross-Site Request Forgery (CSRF) vulnerability in ArtkanMedia Book a Place book-a-place allows Stored XSS.This issue affects Book a Place: from n/a through <= 0.7.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 20:10:58 UTC

Technical Analysis

CVE-2025-23690 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the ArtkanMedia Book a Place web application, specifically affecting versions up to and including 0.7.1. CSRF vulnerabilities occur when a web application fails to verify that state-changing requests originate from legitimate users, allowing attackers to trick authenticated users into submitting malicious requests unknowingly. In this case, the CSRF vulnerability facilitates the injection of Stored Cross-Site Scripting (XSS) payloads, which are malicious scripts permanently stored on the server and executed in the browsers of users who access the affected content. Stored XSS can lead to session hijacking, credential theft, defacement, or distribution of malware. The combination of CSRF and stored XSS significantly amplifies the attack surface, as CSRF can be used to inject the malicious script without user interaction beyond visiting a crafted page. The vulnerability affects all versions of Book a Place up to 0.7.1, with no patches currently available. The absence of a CVSS score indicates this is a newly published vulnerability, but its technical characteristics suggest a high risk. No known exploits have been reported in the wild, but the potential for exploitation is high given the nature of the vulnerability. The application’s failure to implement anti-CSRF tokens or other protective mechanisms is the root cause. This vulnerability highlights the importance of secure coding practices around request validation and output encoding to prevent injection attacks.

Potential Impact

The impact of CVE-2025-23690 is significant for organizations using the ArtkanMedia Book a Place application. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users via CSRF, leading to the injection of persistent XSS payloads. This can compromise user confidentiality by stealing session cookies or credentials, integrity by altering or injecting malicious content, and availability if the application or user sessions are disrupted. Stored XSS can also facilitate further attacks such as phishing, malware distribution, or lateral movement within an organization’s network. Since the vulnerability affects a booking platform, attackers could manipulate booking data or user information, potentially causing operational disruptions and reputational damage. The lack of patches and the novelty of the vulnerability increase the risk of exploitation once attackers develop proof-of-concept exploits. Organizations worldwide that rely on this software or similar web booking systems face increased risk, especially those with high volumes of user interactions or sensitive data. The threat also raises compliance concerns for data protection regulations due to the potential exposure of personal data.

Mitigation Recommendations

To mitigate CVE-2025-23690, organizations should immediately implement the following specific measures: 1) Apply strict anti-CSRF protections such as synchronizer tokens or double-submit cookies to all state-changing requests to ensure requests originate from legitimate users. 2) Conduct thorough input validation and output encoding to prevent stored XSS payloads from being injected or executed. 3) Review and harden authentication and session management controls to limit the impact of session hijacking. 4) Monitor web application logs for unusual or suspicious requests that may indicate exploitation attempts. 5) Isolate or sandbox user-generated content to reduce the risk of script execution in user browsers. 6) Engage with the vendor or community to obtain patches or updates as soon as they become available. 7) Educate users about the risks of clicking on untrusted links or visiting suspicious websites while authenticated. 8) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns. These targeted actions go beyond generic advice and address the root causes and exploitation vectors of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:28:15.069Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd764be6bfc5ba1df0b043

Added to database: 4/1/2026, 7:47:23 PM

Last enriched: 4/1/2026, 8:10:58 PM

Last updated: 4/6/2026, 9:12:37 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses