Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28933: Cross-Site Request Forgery (CSRF) in maxfoundry MaxA/B

0
Unknown
VulnerabilityCVE-2025-28933cvecve-2025-28933
Published: Tue Mar 11 2025 (03/11/2025, 21:01:14 UTC)
Source: CVE Database V5
Vendor/Project: maxfoundry
Product: MaxA/B

Description

Cross-Site Request Forgery (CSRF) vulnerability in maxfoundry MaxA/B maxab allows Stored XSS.This issue affects MaxA/B: from n/a through <= 2.2.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 23:43:25 UTC

Technical Analysis

CVE-2025-28933 identifies a Cross-Site Request Forgery (CSRF) vulnerability in maxfoundry's MaxA/B software, specifically affecting versions up to 2.2.2. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, which the application trusts as legitimate. In this case, the CSRF flaw enables Stored Cross-Site Scripting (XSS), meaning that malicious scripts can be injected and persist within the application’s data store. When other users access the affected pages, the injected scripts execute in their browsers, potentially stealing session tokens, performing unauthorized actions, or spreading malware. The vulnerability stems from insufficient request validation and lack of anti-CSRF tokens or similar protections in MaxA/B. Although no exploits are currently reported in the wild, the combination of CSRF and stored XSS significantly raises the risk profile. The absence of a CVSS score complicates severity assessment, but the potential for persistent XSS combined with CSRF indicates a high risk. The vulnerability affects web applications that rely on MaxA/B for A/B testing or content optimization, which may be integrated into various websites and platforms. The attack requires the victim to be authenticated and visit a malicious site, but no additional user interaction is necessary. The vulnerability was published on March 11, 2025, and no official patches or fixes have been linked yet, emphasizing the need for immediate mitigation steps.

Potential Impact

The impact of CVE-2025-28933 is significant for organizations using maxfoundry MaxA/B, as it enables attackers to perform unauthorized actions via CSRF and inject persistent malicious scripts through Stored XSS. This can lead to session hijacking, data theft, unauthorized configuration changes, and the spread of malware within the affected web applications. The persistent nature of the XSS increases the attack surface, potentially affecting multiple users over time. Organizations may face data breaches, reputational damage, and compliance violations if sensitive user data is compromised. The vulnerability undermines the integrity and confidentiality of user sessions and data. Since exploitation requires only that an authenticated user visits a malicious site, the attack vector is relatively easy to execute remotely, increasing the risk of widespread exploitation once a public exploit emerges. The lack of patches means organizations must rely on interim mitigations, increasing operational risk. Given the use of MaxA/B in marketing and content optimization, attackers could also manipulate business-critical experiments or user experience data, impacting business decisions.

Mitigation Recommendations

To mitigate CVE-2025-28933, organizations should implement the following specific measures: 1) Immediately restrict access to MaxA/B administrative and configuration interfaces to trusted IP addresses or VPNs to reduce exposure. 2) Employ web application firewalls (WAFs) with custom rules to detect and block CSRF attack patterns and suspicious request origins. 3) Enforce strict Content Security Policy (CSP) headers to limit the impact of any injected scripts. 4) Educate users to avoid clicking on suspicious links or visiting untrusted websites while authenticated to MaxA/B. 5) Monitor logs for unusual POST requests or changes in MaxA/B configurations that could indicate exploitation attempts. 6) If possible, disable or limit MaxA/B features that allow user input or content changes until a patch is available. 7) Engage with maxfoundry support or community channels to obtain or request patches or updates addressing this vulnerability. 8) Conduct thorough security testing and code review of MaxA/B integrations to identify and remediate CSRF and XSS weaknesses. These targeted actions go beyond generic advice and focus on reducing attack surface and detecting exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:09:57.114Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72f0e6bfc5ba1deef624

Added to database: 4/1/2026, 7:33:04 PM

Last enriched: 4/1/2026, 11:43:25 PM

Last updated: 4/5/2026, 3:50:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses