CVE-2025-32673: Cross-Site Request Forgery (CSRF) in epeken Epeken All Kurir
Cross-Site Request Forgery (CSRF) vulnerability in epeken Epeken All Kurir epeken-all-kurir allows Stored XSS.This issue affects Epeken All Kurir: from n/a through <= 2.0.6.
AI Analysis
Technical Summary
CVE-2025-32673 identifies a security vulnerability in the epeken Epeken All Kurir software, specifically versions up to 2.0.6. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability, which allows attackers to trick authenticated users into submitting unwanted requests to the application without their consent. This can lead to unauthorized actions being executed with the victim's privileges. Compounding this, the vulnerability also enables Stored Cross-Site Scripting (XSS), where malicious scripts injected by an attacker are persistently stored on the server and executed in the browsers of users who access the affected content. This combination of CSRF and Stored XSS significantly increases the attack surface, allowing attackers to hijack user sessions, steal sensitive information, manipulate data, or perform administrative actions. The vulnerability affects all versions up to and including 2.0.6, with no patches or fixes currently linked or available. No known exploits have been reported in the wild, but the presence of these vulnerabilities indicates a critical weakness in the input validation and request verification mechanisms of the software. The lack of a CVSS score necessitates an expert severity assessment based on the potential impact and exploitability.
Potential Impact
The impact of this vulnerability is substantial for organizations using the epeken Epeken All Kurir platform. Successful exploitation can lead to unauthorized actions performed on behalf of legitimate users, including administrative functions, data manipulation, or disruption of services. Stored XSS can compromise user confidentiality by stealing session tokens, credentials, or other sensitive data, and can also be used to spread malware or conduct phishing attacks. The integrity of the system is at risk due to unauthorized data changes, and availability could be affected if attackers disrupt normal operations. Organizations relying on this software for logistics, shipping, or e-commerce operations may face operational disruptions, reputational damage, and potential regulatory consequences if customer data is compromised. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to ensure that all state-changing requests are verified as legitimate. Input validation and output encoding should be enforced to prevent Stored XSS, ensuring that user-supplied data is sanitized before storage and rendering. Monitoring and logging of unusual user activities can help detect exploitation attempts early. Until an official patch is released, consider applying virtual patching via Web Application Firewalls (WAFs) to block suspicious requests targeting CSRF and XSS vectors. Educate users about the risks of clicking on untrusted links or executing unknown scripts. Regularly update and audit the epeken Epeken All Kurir installation and related dependencies. Engage with the vendor for timely patch releases and apply them promptly once available.
Affected Countries
Indonesia, Malaysia, Singapore, Thailand, Vietnam, Philippines, India, United States, Germany, United Kingdom
CVE-2025-32673: Cross-Site Request Forgery (CSRF) in epeken Epeken All Kurir
Description
Cross-Site Request Forgery (CSRF) vulnerability in epeken Epeken All Kurir epeken-all-kurir allows Stored XSS.This issue affects Epeken All Kurir: from n/a through <= 2.0.6.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-32673 identifies a security vulnerability in the epeken Epeken All Kurir software, specifically versions up to 2.0.6. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability, which allows attackers to trick authenticated users into submitting unwanted requests to the application without their consent. This can lead to unauthorized actions being executed with the victim's privileges. Compounding this, the vulnerability also enables Stored Cross-Site Scripting (XSS), where malicious scripts injected by an attacker are persistently stored on the server and executed in the browsers of users who access the affected content. This combination of CSRF and Stored XSS significantly increases the attack surface, allowing attackers to hijack user sessions, steal sensitive information, manipulate data, or perform administrative actions. The vulnerability affects all versions up to and including 2.0.6, with no patches or fixes currently linked or available. No known exploits have been reported in the wild, but the presence of these vulnerabilities indicates a critical weakness in the input validation and request verification mechanisms of the software. The lack of a CVSS score necessitates an expert severity assessment based on the potential impact and exploitability.
Potential Impact
The impact of this vulnerability is substantial for organizations using the epeken Epeken All Kurir platform. Successful exploitation can lead to unauthorized actions performed on behalf of legitimate users, including administrative functions, data manipulation, or disruption of services. Stored XSS can compromise user confidentiality by stealing session tokens, credentials, or other sensitive data, and can also be used to spread malware or conduct phishing attacks. The integrity of the system is at risk due to unauthorized data changes, and availability could be affected if attackers disrupt normal operations. Organizations relying on this software for logistics, shipping, or e-commerce operations may face operational disruptions, reputational damage, and potential regulatory consequences if customer data is compromised. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to ensure that all state-changing requests are verified as legitimate. Input validation and output encoding should be enforced to prevent Stored XSS, ensuring that user-supplied data is sanitized before storage and rendering. Monitoring and logging of unusual user activities can help detect exploitation attempts early. Until an official patch is released, consider applying virtual patching via Web Application Firewalls (WAFs) to block suspicious requests targeting CSRF and XSS vectors. Educate users about the risks of clicking on untrusted links or executing unknown scripts. Regularly update and audit the epeken Epeken All Kurir installation and related dependencies. Engage with the vendor for timely patch releases and apply them promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-09T11:21:18.307Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd73ede6bfc5ba1def417c
Added to database: 4/1/2026, 7:37:17 PM
Last enriched: 4/2/2026, 3:49:01 AM
Last updated: 4/3/2026, 7:22:28 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.