CVE-2025-34133: CWE-352 Cross-Site Request Forgery (CSRF) in Cloud Solutions SAS Wimi Teamwork
Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.
AI Analysis
Technical Summary
CVE-2025-34133 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the API of Cloud Solutions SAS's Wimi Teamwork product, affecting all versions prior to 7.38.17. The vulnerability arises because the API accepts any authenticated request containing a JSON field named 'csrf_token' without validating the token's actual value; it only checks for the presence of this field. This flawed validation allows an attacker to craft a malicious cross-site request that, when executed by a logged-in victim's browser, submits a JSON POST request with an arbitrary or empty 'csrf_token'. The API processes this request with the victim's privileges, bypassing intended CSRF protections. As a result, attackers can perform unauthorized privileged actions such as modifying data, escalating privileges, or disrupting services. The vulnerability requires no prior authentication by the attacker but does require victim user interaction (e.g., visiting a malicious website). The CVSS 4.0 score is 7.0 (high), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on integrity and availability with low impact on confidentiality. No public exploits are known yet, and no patches are linked in the provided data, indicating organizations must monitor vendor updates closely. This vulnerability is classified under CWE-352, a common web security weakness related to CSRF attacks.
Potential Impact
For European organizations using Wimi Teamwork, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized actions performed with legitimate user privileges, including account takeover and privilege escalation, potentially compromising sensitive project data and collaboration workflows. This can disrupt business operations, cause data integrity issues, and lead to service outages. The impact is particularly critical for organizations relying on Wimi Teamwork for sensitive or regulated data, such as those in finance, healthcare, or government sectors. Additionally, compromised accounts could be leveraged for lateral movement within networks, increasing the scope of damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, emphasizing the need for user awareness. The lack of current known exploits provides a window for proactive mitigation, but the high CVSS score indicates the threat should be treated with urgency.
Mitigation Recommendations
Organizations should immediately upgrade Wimi Teamwork to version 7.38.17 or later once available to ensure the vulnerability is patched. Until patches are applied, implement strict Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, reducing the risk of malicious cross-site requests. Employ additional CSRF protections such as double-submit cookies or same-site cookies to complement the flawed API token validation. Monitor API logs for unusual POST requests containing the 'csrf_token' field with empty or suspicious values. Educate users about phishing risks and the dangers of interacting with untrusted websites while logged into Wimi Teamwork. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns. Conduct regular security assessments and penetration tests focusing on API endpoints to detect similar weaknesses. Finally, maintain an incident response plan to quickly address any signs of exploitation.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-34133: CWE-352 Cross-Site Request Forgery (CSRF) in Cloud Solutions SAS Wimi Teamwork
Description
Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.
AI-Powered Analysis
Technical Analysis
CVE-2025-34133 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the API of Cloud Solutions SAS's Wimi Teamwork product, affecting all versions prior to 7.38.17. The vulnerability arises because the API accepts any authenticated request containing a JSON field named 'csrf_token' without validating the token's actual value; it only checks for the presence of this field. This flawed validation allows an attacker to craft a malicious cross-site request that, when executed by a logged-in victim's browser, submits a JSON POST request with an arbitrary or empty 'csrf_token'. The API processes this request with the victim's privileges, bypassing intended CSRF protections. As a result, attackers can perform unauthorized privileged actions such as modifying data, escalating privileges, or disrupting services. The vulnerability requires no prior authentication by the attacker but does require victim user interaction (e.g., visiting a malicious website). The CVSS 4.0 score is 7.0 (high), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on integrity and availability with low impact on confidentiality. No public exploits are known yet, and no patches are linked in the provided data, indicating organizations must monitor vendor updates closely. This vulnerability is classified under CWE-352, a common web security weakness related to CSRF attacks.
Potential Impact
For European organizations using Wimi Teamwork, this vulnerability poses significant risks. Successful exploitation can lead to unauthorized actions performed with legitimate user privileges, including account takeover and privilege escalation, potentially compromising sensitive project data and collaboration workflows. This can disrupt business operations, cause data integrity issues, and lead to service outages. The impact is particularly critical for organizations relying on Wimi Teamwork for sensitive or regulated data, such as those in finance, healthcare, or government sectors. Additionally, compromised accounts could be leveraged for lateral movement within networks, increasing the scope of damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, emphasizing the need for user awareness. The lack of current known exploits provides a window for proactive mitigation, but the high CVSS score indicates the threat should be treated with urgency.
Mitigation Recommendations
Organizations should immediately upgrade Wimi Teamwork to version 7.38.17 or later once available to ensure the vulnerability is patched. Until patches are applied, implement strict Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, reducing the risk of malicious cross-site requests. Employ additional CSRF protections such as double-submit cookies or same-site cookies to complement the flawed API token validation. Monitor API logs for unusual POST requests containing the 'csrf_token' field with empty or suspicious values. Educate users about phishing risks and the dangers of interacting with untrusted websites while logged into Wimi Teamwork. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious CSRF patterns. Conduct regular security assessments and penetration tests focusing on API endpoints to detect similar weaknesses. Finally, maintain an incident response plan to quickly address any signs of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff8e44ba6dffc5e2ff0b8e
Added to database: 10/27/2025, 3:22:44 PM
Last enriched: 10/27/2025, 3:37:46 PM
Last updated: 10/30/2025, 5:19:36 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62231: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.