Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26931: Cross-Site Request Forgery (CSRF) in Tribulant Software Tribulant Gallery Voting

0
Unknown
VulnerabilityCVE-2025-26931cvecve-2025-26931
Published: Tue Feb 25 2025 (02/25/2025, 14:17:54 UTC)
Source: CVE Database V5
Vendor/Project: Tribulant Software
Product: Tribulant Gallery Voting

Description

Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Software Tribulant Gallery Voting gallery-voting allows Stored XSS.This issue affects Tribulant Gallery Voting: from n/a through <= 1.2.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:45:06 UTC

Technical Analysis

CVE-2025-26931 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Tribulant Gallery Voting plugin developed by Tribulant Software. The affected versions include all releases up to and including version 1.2.1. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, potentially causing unauthorized actions without the user's consent. In this case, the CSRF vulnerability can be leveraged to inject stored Cross-Site Scripting (XSS) payloads into the gallery voting system. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database, and executed in the browsers of users who access the affected content. This combination of CSRF and stored XSS increases the attack surface, enabling attackers to hijack user sessions, steal sensitive information, or perform actions with the victim's privileges. The vulnerability requires the victim to be authenticated to the vulnerable application and to visit a maliciously crafted webpage or link. No CVSS score has been assigned yet, and no known exploits are currently reported in the wild. The vulnerability was published on February 25, 2025, and is tracked under CVE-2025-26931. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation efforts.

Potential Impact

The impact of CVE-2025-26931 is significant for organizations using the Tribulant Gallery Voting plugin. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, including the injection of malicious scripts that execute in the context of the victim's browser. This can result in session hijacking, theft of sensitive information such as cookies or credentials, defacement of web content, or distribution of malware. The integrity and confidentiality of user data are at risk, and the availability of the service could be indirectly affected if attackers disrupt normal operations or damage user trust. Organizations relying on this plugin for user engagement or voting functionalities may face reputational damage and potential regulatory consequences if user data is compromised. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature and ease of exploitation make it a high-risk issue that could be targeted in the future.

Mitigation Recommendations

To mitigate CVE-2025-26931, organizations should first verify if they are using the Tribulant Gallery Voting plugin version 1.2.1 or earlier. If so, they should monitor the vendor's announcements closely for an official patch and apply it promptly once available. In the interim, implement strict CSRF protections such as synchronizer tokens or double-submit cookies to validate the legitimacy of requests. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts and XSS payloads targeting the voting endpoints. Additionally, review and harden user input validation and output encoding to prevent stored XSS exploitation. Limiting user privileges and enforcing least privilege principles can reduce the potential damage from compromised accounts. Educate users about the risks of clicking unknown links while authenticated to sensitive applications. Finally, conduct regular security assessments and penetration testing focused on CSRF and XSS vulnerabilities to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-17T11:51:10.110Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72bae6bfc5ba1deecb92

Added to database: 4/1/2026, 7:32:10 PM

Last enriched: 4/1/2026, 10:45:06 PM

Last updated: 4/6/2026, 11:01:29 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses