Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34133: CWE-352 Cross-Site Request Forgery (CSRF) in Cloud Solutions SAS Wimi Teamwork

0
High
VulnerabilityCVE-2025-34133cvecve-2025-34133cwe-352
Published: Mon Oct 27 2025 (10/27/2025, 15:13:06 UTC)
Source: CVE Database V5
Vendor/Project: Cloud Solutions SAS
Product: Wimi Teamwork

Description

Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.

AI-Powered Analysis

AILast updated: 10/27/2025, 15:37:46 UTC

Technical Analysis

CVE-2025-34133 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the API of Cloud Solutions SAS's Wimi Teamwork product, affecting all versions prior to 7.38.17. The vulnerability arises because the API accepts any authenticated request containing a JSON field named 'csrf_token' without validating the token's actual value; it only checks for the presence of this field. This flawed validation allows an attacker to craft a malicious cross-site request that, when executed by a logged-in victim's browser, submits a JSON POST request with an arbitrary or empty 'csrf_token'. The API processes this request with the victim's privileges, bypassing intended CSRF protections. As a result, attackers can perform unauthorized privileged actions such as modifying data, escalating privileges, or disrupting services. The vulnerability requires no prior authentication by the attacker but does require victim user interaction (e.g., visiting a malicious website). The CVSS 4.0 score is 7.0 (high), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on integrity and availability with low impact on confidentiality. No public exploits are known yet, and no patches are linked in the provided data, indicating organizations must monitor vendor updates closely. This vulnerability is classified under CWE-352, a common web security weakness related to CSRF attacks.

Potential Impact

For European organizations using Wimi Teamwork, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized actions performed with legitimate user privileges, including account takeover and privilege escalation, potentially compromising sensitive project data and collaboration workflows. This can disrupt business operations, cause data integrity issues, and lead to service outages. The impact is particularly critical for organizations relying on Wimi Teamwork for sensitive or regulated data, such as those in finance, healthcare, or government sectors. Additionally, compromised accounts could be leveraged for lateral movement within networks, increasing the scope of damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, emphasizing the need for user awareness. The lack of current known exploits provides a window for proactive mitigation, but the high CVSS score indicates the threat should be treated with urgency.

Mitigation Recommendations

Organizations should immediately upgrade Wimi Teamwork to version 7.38.17 or later once available to ensure the vulnerability is patched. Until patches are applied, implement strict Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, reducing the risk of malicious cross-site requests. Employ additional CSRF protections such as double-submit cookies or same-site cookies to complement the flawed API token validation. Monitor API logs for unusual POST requests containing the 'csrf_token' field with empty or suspicious values. Educate users about phishing risks and the dangers of interacting with untrusted websites while logged into Wimi Teamwork. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns. Conduct regular security assessments and penetration tests focusing on API endpoints to detect similar weaknesses. Finally, maintain an incident response plan to quickly address any signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff8e44ba6dffc5e2ff0b8e

Added to database: 10/27/2025, 3:22:44 PM

Last enriched: 10/27/2025, 3:37:46 PM

Last updated: 10/30/2025, 5:19:36 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats