CVE-2025-28950: CWE-352 Cross-Site Request Forgery (CSRF) in David Shabtai Post Author
Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1.
AI Analysis
Technical Summary
CVE-2025-28950 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness in the 'Post Author' product developed by David Shabtai. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw in Post Author can be leveraged to inject Stored Cross-Site Scripting (XSS) payloads. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database or content repository, and then served to users. The combination of CSRF and Stored XSS significantly amplifies the threat, as an attacker can trick a logged-in user into submitting a crafted request that results in malicious script storage, which subsequently executes in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is rated as low to moderate (C:L/I:L/A:L), indicating that while the attacker can cause some data exposure, modification, and service disruption, the overall damage is limited but still significant. The affected versions are not explicitly enumerated beyond 'n/a through 1.1.1', suggesting all versions up to 1.1.1 are vulnerable. No patches or known exploits in the wild have been reported as of the publication date (June 6, 2025).
Potential Impact
For European organizations using the Post Author product, this vulnerability poses a notable risk. The ability to perform CSRF attacks that lead to Stored XSS can compromise user sessions, steal sensitive information such as authentication tokens or personal data, and potentially allow attackers to pivot within the network. This is particularly concerning for organizations that rely on Post Author for content management or user-generated content, as malicious scripts could be injected into widely viewed pages, affecting many users. The integrity of published content could be undermined, damaging organizational reputation and trust. Additionally, the vulnerability could be exploited to perform further attacks such as session hijacking, phishing, or spreading malware. Given the network attack vector and no privilege requirements, attackers can exploit this remotely, increasing the threat surface. The requirement for user interaction (e.g., clicking a malicious link) means social engineering tactics could be employed. The impact on availability is limited but could include denial of service if malicious scripts disrupt normal operations. Overall, European entities with web-facing deployments of Post Author should consider this vulnerability a serious threat to their web application security and user data protection.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, enforce strict anti-CSRF tokens on all state-changing requests within Post Author to prevent unauthorized request forgery. Validate the origin and referer headers to ensure requests originate from trusted sources. Employ Content Security Policy (CSP) headers to restrict the execution of injected scripts and reduce the impact of Stored XSS. Conduct thorough input validation and output encoding on all user-supplied content to prevent script injection. Educate users about the risks of clicking unsolicited links and implement multi-factor authentication to reduce the risk of session hijacking. Monitor web application logs for unusual POST requests or content changes indicative of exploitation attempts. Consider deploying a Web Application Firewall (WAF) with rules targeting CSRF and XSS attack patterns. Finally, maintain close communication with the vendor for updates and patches, and plan for rapid deployment once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-28950: CWE-352 Cross-Site Request Forgery (CSRF) in David Shabtai Post Author
Description
Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-28950 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness in the 'Post Author' product developed by David Shabtai. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw in Post Author can be leveraged to inject Stored Cross-Site Scripting (XSS) payloads. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database or content repository, and then served to users. The combination of CSRF and Stored XSS significantly amplifies the threat, as an attacker can trick a logged-in user into submitting a crafted request that results in malicious script storage, which subsequently executes in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is rated as low to moderate (C:L/I:L/A:L), indicating that while the attacker can cause some data exposure, modification, and service disruption, the overall damage is limited but still significant. The affected versions are not explicitly enumerated beyond 'n/a through 1.1.1', suggesting all versions up to 1.1.1 are vulnerable. No patches or known exploits in the wild have been reported as of the publication date (June 6, 2025).
Potential Impact
For European organizations using the Post Author product, this vulnerability poses a notable risk. The ability to perform CSRF attacks that lead to Stored XSS can compromise user sessions, steal sensitive information such as authentication tokens or personal data, and potentially allow attackers to pivot within the network. This is particularly concerning for organizations that rely on Post Author for content management or user-generated content, as malicious scripts could be injected into widely viewed pages, affecting many users. The integrity of published content could be undermined, damaging organizational reputation and trust. Additionally, the vulnerability could be exploited to perform further attacks such as session hijacking, phishing, or spreading malware. Given the network attack vector and no privilege requirements, attackers can exploit this remotely, increasing the threat surface. The requirement for user interaction (e.g., clicking a malicious link) means social engineering tactics could be employed. The impact on availability is limited but could include denial of service if malicious scripts disrupt normal operations. Overall, European entities with web-facing deployments of Post Author should consider this vulnerability a serious threat to their web application security and user data protection.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, enforce strict anti-CSRF tokens on all state-changing requests within Post Author to prevent unauthorized request forgery. Validate the origin and referer headers to ensure requests originate from trusted sources. Employ Content Security Policy (CSP) headers to restrict the execution of injected scripts and reduce the impact of Stored XSS. Conduct thorough input validation and output encoding on all user-supplied content to prevent script injection. Educate users about the risks of clicking unsolicited links and implement multi-factor authentication to reduce the risk of session hijacking. Monitor web application logs for unusual POST requests or content changes indicative of exploitation attempts. Consider deploying a Web Application Firewall (WAF) with rules targeting CSRF and XSS attack patterns. Finally, maintain close communication with the vendor for updates and patches, and plan for rapid deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-11T08:10:12.306Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842edda71f4d251b5c87f30
Added to database: 6/6/2025, 1:32:10 PM
Last enriched: 7/8/2025, 12:10:39 AM
Last updated: 7/30/2025, 4:14:05 PM
Views: 10
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.