Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23703: Cross-Site Request Forgery (CSRF) in cstoltenkamp Free MailClient FMC

0
Unknown
VulnerabilityCVE-2025-23703cvecve-2025-23703
Published: Thu Jan 16 2025 (01/16/2025, 20:06:45 UTC)
Source: CVE Database V5
Vendor/Project: cstoltenkamp
Product: Free MailClient FMC

Description

Cross-Site Request Forgery (CSRF) vulnerability in cstoltenkamp Free MailClient FMC mailclient allows Stored XSS.This issue affects Free MailClient FMC: from n/a through <= 1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:32:36 UTC

Technical Analysis

CVE-2025-23703 identifies a security vulnerability in the Free MailClient FMC developed by cstoltenkamp, specifically versions up to and including 1.0. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to execute unauthorized commands on behalf of authenticated users. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), allowing attackers to inject malicious scripts that are stored persistently within the mail client environment. When a victim interacts with the compromised mail client, these scripts can execute in the context of the user's session, leading to potential data theft, session hijacking, or further exploitation. The vulnerability arises due to insufficient validation of user requests and lack of anti-CSRF protections, allowing crafted requests from malicious sites to be accepted by the mail client. The absence of a CVSS score and official patches indicates this is a newly disclosed issue with no public exploit yet. The Free MailClient FMC is a mail client software that may be used in various organizational and individual settings, making the vulnerability relevant to a broad user base. The combination of CSRF and Stored XSS increases the attack surface and potential damage, as attackers can both force actions and persist malicious code within the application.

Potential Impact

The impact of CVE-2025-23703 is significant for organizations using Free MailClient FMC. Successful exploitation can lead to unauthorized actions performed without user consent, such as changing mail settings, sending emails, or manipulating stored data. The Stored XSS component allows attackers to maintain persistent malicious scripts within the mail client, which can steal sensitive information like credentials, session tokens, or personal communications. This compromises confidentiality and integrity of user data and can lead to broader network compromise if attackers leverage stolen credentials. Availability may also be affected if attackers disrupt mail client functionality or cause denial of service through malicious scripts. Organizations relying on this mail client for internal or external communications face risks of data breaches, reputational damage, and compliance violations. The lack of known exploits currently reduces immediate risk but also means defenders must proactively address the vulnerability before exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-23703, organizations should implement multiple layers of defense. First, apply any available patches or updates from the vendor as soon as they are released. In the absence of patches, administrators should enforce strict input validation and sanitization to prevent injection of malicious scripts. Implement anti-CSRF tokens in all state-changing requests to ensure that actions originate from legitimate sources. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts within the mail client environment. Educate users to avoid clicking on suspicious links or visiting untrusted websites while authenticated to the mail client. Network-level controls such as web application firewalls (WAFs) can help detect and block CSRF and XSS attack patterns. Regularly audit and monitor mail client logs for unusual activities indicative of exploitation attempts. Finally, consider isolating or replacing the affected mail client with more secure alternatives if remediation is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:28:31.296Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd764de6bfc5ba1df0b110

Added to database: 4/1/2026, 7:47:25 PM

Last enriched: 4/2/2026, 11:32:36 AM

Last updated: 4/5/2026, 12:23:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses