Skip to main content

CVE-2025-28950: CWE-352 Cross-Site Request Forgery (CSRF) in David Shabtai Post Author

High
VulnerabilityCVE-2025-28950cvecve-2025-28950cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:54:35 UTC)
Source: CVE Database V5
Vendor/Project: David Shabtai
Product: Post Author

Description

Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:10:39 UTC

Technical Analysis

CVE-2025-28950 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness in the 'Post Author' product developed by David Shabtai. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw in Post Author can be leveraged to inject Stored Cross-Site Scripting (XSS) payloads. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database or content repository, and then served to users. The combination of CSRF and Stored XSS significantly amplifies the threat, as an attacker can trick a logged-in user into submitting a crafted request that results in malicious script storage, which subsequently executes in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is rated as low to moderate (C:L/I:L/A:L), indicating that while the attacker can cause some data exposure, modification, and service disruption, the overall damage is limited but still significant. The affected versions are not explicitly enumerated beyond 'n/a through 1.1.1', suggesting all versions up to 1.1.1 are vulnerable. No patches or known exploits in the wild have been reported as of the publication date (June 6, 2025).

Potential Impact

For European organizations using the Post Author product, this vulnerability poses a notable risk. The ability to perform CSRF attacks that lead to Stored XSS can compromise user sessions, steal sensitive information such as authentication tokens or personal data, and potentially allow attackers to pivot within the network. This is particularly concerning for organizations that rely on Post Author for content management or user-generated content, as malicious scripts could be injected into widely viewed pages, affecting many users. The integrity of published content could be undermined, damaging organizational reputation and trust. Additionally, the vulnerability could be exploited to perform further attacks such as session hijacking, phishing, or spreading malware. Given the network attack vector and no privilege requirements, attackers can exploit this remotely, increasing the threat surface. The requirement for user interaction (e.g., clicking a malicious link) means social engineering tactics could be employed. The impact on availability is limited but could include denial of service if malicious scripts disrupt normal operations. Overall, European entities with web-facing deployments of Post Author should consider this vulnerability a serious threat to their web application security and user data protection.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. First, enforce strict anti-CSRF tokens on all state-changing requests within Post Author to prevent unauthorized request forgery. Validate the origin and referer headers to ensure requests originate from trusted sources. Employ Content Security Policy (CSP) headers to restrict the execution of injected scripts and reduce the impact of Stored XSS. Conduct thorough input validation and output encoding on all user-supplied content to prevent script injection. Educate users about the risks of clicking unsolicited links and implement multi-factor authentication to reduce the risk of session hijacking. Monitor web application logs for unusual POST requests or content changes indicative of exploitation attempts. Consider deploying a Web Application Firewall (WAF) with rules targeting CSRF and XSS attack patterns. Finally, maintain close communication with the vendor for updates and patches, and plan for rapid deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:12.306Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842edda71f4d251b5c87f30

Added to database: 6/6/2025, 1:32:10 PM

Last enriched: 7/8/2025, 12:10:39 AM

Last updated: 7/30/2025, 4:14:05 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats