Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25103: Cross-Site Request Forgery (CSRF) in bnielsen Indeed API

0
Unknown
VulnerabilityCVE-2025-25103cvecve-2025-25103
Published: Fri Feb 07 2025 (02/07/2025, 10:11:42 UTC)
Source: CVE Database V5
Vendor/Project: bnielsen
Product: Indeed API

Description

Cross-Site Request Forgery (CSRF) vulnerability in bnielsen Indeed API indeed-api allows Cross Site Request Forgery.This issue affects Indeed API: from n/a through <= 0.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:53:04 UTC

Technical Analysis

CVE-2025-25103 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the bnielsen Indeed API, specifically affecting versions up to 0.5. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their knowledge, exploiting the user's active session. In this case, the Indeed API lacks adequate CSRF protections, such as anti-CSRF tokens or origin checks, allowing attackers to perform unauthorized state-changing operations on behalf of the user. The vulnerability affects the API endpoints that accept state-changing requests, potentially enabling attackers to manipulate job data, user preferences, or other sensitive operations exposed by the API. Although no known exploits have been reported in the wild, the vulnerability is publicly disclosed and published in early 2025. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the nature of CSRF attacks generally implies a significant risk, especially when authentication is required and user interaction (such as visiting a malicious site) is needed. The affected product, Indeed API by bnielsen, is used in job search and recruitment platforms, which may be integrated into various third-party applications and websites. This increases the attack surface and the potential impact on organizations relying on these services. The vulnerability was reserved and published by Patchstack, a known vulnerability database, indicating credible reporting. No patches or fixes are currently linked, so organizations must implement compensating controls to mitigate risk.

Potential Impact

The impact of CVE-2025-25103 can be significant for organizations using the bnielsen Indeed API in their recruitment or job search platforms. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users, potentially altering job postings, user data, or application settings. This can lead to data integrity issues, unauthorized data manipulation, and erosion of user trust. For platforms handling sensitive recruitment data or personal information, this could result in compliance violations and reputational damage. Additionally, attackers could leverage this vulnerability to conduct further attacks, such as privilege escalation or lateral movement within integrated systems. The requirement for user authentication and interaction limits the scope somewhat but does not eliminate risk, especially in environments where users frequently interact with the API through web interfaces. Organizations worldwide that integrate the Indeed API into their services may face operational disruptions and increased risk of account compromise or data tampering. The lack of known exploits currently provides a window for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

To mitigate CVE-2025-25103, organizations should implement robust anti-CSRF protections in any applications interfacing with the bnielsen Indeed API. This includes the use of anti-CSRF tokens that are validated on the server side for all state-changing requests. Additionally, validating the Origin and Referer headers can help ensure requests originate from trusted sources. Where possible, enforce strict authentication and session management policies to limit the risk of session hijacking. Organizations should monitor API usage logs for unusual or unauthorized requests indicative of CSRF exploitation attempts. Developers should update to patched versions of the Indeed API once available and apply security best practices such as the principle of least privilege for API credentials. User education about the risks of clicking unknown links or visiting untrusted websites can reduce the likelihood of successful CSRF attacks. Network-level protections like Web Application Firewalls (WAFs) can be configured to detect and block suspicious cross-site requests. Finally, organizations should maintain an incident response plan to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-03T13:34:30.656Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7289e6bfc5ba1deeabb3

Added to database: 4/1/2026, 7:31:21 PM

Last enriched: 4/1/2026, 9:53:04 PM

Last updated: 4/3/2026, 12:41:38 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses