Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31388: Cross-Site Request Forgery (CSRF) in doa The World

0
Unknown
VulnerabilityCVE-2025-31388cvecve-2025-31388
Published: Wed Apr 09 2025 (04/09/2025, 16:10:05 UTC)
Source: CVE Database V5
Vendor/Project: doa
Product: The World

Description

Cross-Site Request Forgery (CSRF) vulnerability in doa The World the-world allows Stored XSS.This issue affects The World: from n/a through <= 0.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 01:07:08 UTC

Technical Analysis

CVE-2025-31388 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the doa The World product, specifically affecting versions up to 0.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing unintended actions without the user's consent. In this case, the vulnerability enables Stored Cross-Site Scripting (XSS), which means that malicious scripts injected via the forged requests can be permanently stored on the server and executed in the browsers of other users who access the affected content. The root cause is the lack of proper validation mechanisms such as anti-CSRF tokens or strict origin checks in The World application. This allows attackers to craft malicious web pages or emails that, when visited by authenticated users, trigger unauthorized state-changing operations. Stored XSS further amplifies the risk by enabling persistent script execution, potentially leading to session hijacking, data theft, or privilege escalation. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and documented in the CVE database, indicating that attackers could develop exploits. The absence of a CVSS score suggests that the vulnerability is newly discovered and pending detailed severity assessment. However, the combination of CSRF and Stored XSS typically represents a critical security risk. The vulnerability affects all installations running The World versions up to 0.4, which may be used in various organizational environments. The vulnerability was reserved on March 28, 2025, and published on April 9, 2025, by Patchstack, a known vulnerability tracking entity.

Potential Impact

The impact of CVE-2025-31388 can be severe for organizations using doa The World software. Successful exploitation allows attackers to perform unauthorized actions on behalf of legitimate users, potentially leading to data manipulation, unauthorized configuration changes, or execution of malicious scripts stored on the server. Stored XSS can compromise user sessions, steal sensitive information such as authentication tokens, and facilitate further attacks like phishing or malware distribution. This undermines the confidentiality, integrity, and availability of the affected systems. Organizations may face data breaches, reputational damage, and regulatory penalties if sensitive user data is exposed. The vulnerability can also serve as a foothold for attackers to pivot within the network, escalating privileges or disrupting services. Since no authentication bypass is indicated, attackers require the victim to be authenticated and tricked into visiting malicious content, but the ease of social engineering makes this feasible. The lack of known exploits in the wild currently limits immediate widespread impact, but the public disclosure increases the risk of future exploitation. Overall, the threat is significant for sectors relying on doa The World, especially those handling sensitive or critical data.

Mitigation Recommendations

To mitigate CVE-2025-31388, organizations should implement multiple layers of defense: 1) Apply patches or updates from the vendor as soon as they become available to address the underlying vulnerability. 2) Implement robust anti-CSRF protections by embedding unique, unpredictable tokens in state-changing requests and validating them server-side. 3) Enforce strict same-origin policies and Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce XSS impact. 4) Conduct thorough input validation and output encoding to prevent injection of malicious scripts. 5) Educate users about the risks of clicking on suspicious links or visiting untrusted websites to reduce social engineering attack vectors. 6) Monitor web application logs and network traffic for unusual or unauthorized requests indicative of CSRF or XSS attempts. 7) Employ web application firewalls (WAFs) configured to detect and block CSRF and XSS attack patterns. 8) Regularly perform security assessments and penetration testing focused on CSRF and XSS vulnerabilities to identify and remediate weaknesses proactively. These measures collectively reduce the attack surface and limit the potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-28T10:59:28.530Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7347e6bfc5ba1def173e

Added to database: 4/1/2026, 7:34:31 PM

Last enriched: 4/2/2026, 1:07:08 AM

Last updated: 4/5/2026, 6:42:32 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses