CVE-2025-34133: CWE-352 Cross-Site Request Forgery (CSRF) in Cloud Solutions SAS Wimi Teamwork
CVE-2025-34133 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Wimi Teamwork versions prior to 7. 38. 17. The API improperly validates the 'csrf_token' field by only checking its presence, not its value, allowing attackers to craft malicious JSON POST requests that execute with the victim's privileges. Exploitation requires the victim to be authenticated and to interact with a malicious site, potentially enabling account takeover, privilege escalation, or service disruption. No known exploits are currently in the wild. The vulnerability has a CVSS 4. 0 score of 7. 0, reflecting its high impact and ease of exploitation without authentication. European organizations using Wimi Teamwork should prioritize patching and implement additional CSRF protections to mitigate risk.
AI Analysis
Technical Summary
CVE-2025-34133 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the API of Wimi Teamwork, a collaboration and project management platform developed by Cloud Solutions SAS. The flaw exists because the API accepts any authenticated JSON POST request containing a 'csrf_token' field without validating the token's actual value; it only checks for the presence of the field. This means an attacker can craft a malicious web page that, when visited by an authenticated user, causes the victim's browser to send a forged request with an arbitrary or empty 'csrf_token'. Since the API does not verify the token's correctness, it processes the request with the victim's privileges. This can lead to unauthorized actions such as modifying project data, changing user settings, escalating privileges, or disrupting services. The vulnerability affects all versions prior to 7.38.17, and no patches are currently linked, indicating a need for urgent vendor response. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality, integrity, and availability is high due to the ability to perform privileged actions. Although no known exploits are reported in the wild, the vulnerability's nature makes it a significant risk for organizations relying on Wimi Teamwork for sensitive collaboration.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality, integrity, and availability of collaborative project data and communications. Successful exploitation could lead to unauthorized data modification, leakage of sensitive information, or disruption of project workflows. This is particularly critical for sectors relying heavily on secure collaboration tools, such as finance, government, healthcare, and critical infrastructure. Attackers could leverage this flaw to escalate privileges within the platform, potentially gaining administrative control or access to confidential projects. The requirement for user interaction (visiting a malicious site) means phishing or social engineering campaigns could be used to trigger exploitation. Given the collaborative nature of Wimi Teamwork, a compromised account could also be used to propagate further attacks within an organization’s network or to external partners. The lack of current known exploits provides a window for mitigation but also a warning that attackers may develop exploits soon.
Mitigation Recommendations
European organizations using Wimi Teamwork should immediately verify their software version and upgrade to version 7.38.17 or later once available. Until patches are released, organizations should implement additional CSRF protections such as enforcing strict same-origin policies, using Content Security Policy (CSP) headers to restrict external content, and educating users to avoid clicking on suspicious links or visiting untrusted websites while authenticated. Network-level controls like web application firewalls (WAFs) can be configured to detect and block suspicious JSON POST requests containing 'csrf_token' fields from untrusted sources. Multi-factor authentication (MFA) should be enforced to reduce the impact of compromised accounts. Regular monitoring of API logs for unusual activity patterns can help detect exploitation attempts early. Finally, organizations should coordinate with Cloud Solutions SAS for timely patch deployment and stay informed about any emerging exploits or advisories.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Switzerland, Italy, Spain
CVE-2025-34133: CWE-352 Cross-Site Request Forgery (CSRF) in Cloud Solutions SAS Wimi Teamwork
Description
CVE-2025-34133 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Wimi Teamwork versions prior to 7. 38. 17. The API improperly validates the 'csrf_token' field by only checking its presence, not its value, allowing attackers to craft malicious JSON POST requests that execute with the victim's privileges. Exploitation requires the victim to be authenticated and to interact with a malicious site, potentially enabling account takeover, privilege escalation, or service disruption. No known exploits are currently in the wild. The vulnerability has a CVSS 4. 0 score of 7. 0, reflecting its high impact and ease of exploitation without authentication. European organizations using Wimi Teamwork should prioritize patching and implement additional CSRF protections to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-34133 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the API of Wimi Teamwork, a collaboration and project management platform developed by Cloud Solutions SAS. The flaw exists because the API accepts any authenticated JSON POST request containing a 'csrf_token' field without validating the token's actual value; it only checks for the presence of the field. This means an attacker can craft a malicious web page that, when visited by an authenticated user, causes the victim's browser to send a forged request with an arbitrary or empty 'csrf_token'. Since the API does not verify the token's correctness, it processes the request with the victim's privileges. This can lead to unauthorized actions such as modifying project data, changing user settings, escalating privileges, or disrupting services. The vulnerability affects all versions prior to 7.38.17, and no patches are currently linked, indicating a need for urgent vendor response. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality, integrity, and availability is high due to the ability to perform privileged actions. Although no known exploits are reported in the wild, the vulnerability's nature makes it a significant risk for organizations relying on Wimi Teamwork for sensitive collaboration.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality, integrity, and availability of collaborative project data and communications. Successful exploitation could lead to unauthorized data modification, leakage of sensitive information, or disruption of project workflows. This is particularly critical for sectors relying heavily on secure collaboration tools, such as finance, government, healthcare, and critical infrastructure. Attackers could leverage this flaw to escalate privileges within the platform, potentially gaining administrative control or access to confidential projects. The requirement for user interaction (visiting a malicious site) means phishing or social engineering campaigns could be used to trigger exploitation. Given the collaborative nature of Wimi Teamwork, a compromised account could also be used to propagate further attacks within an organization’s network or to external partners. The lack of current known exploits provides a window for mitigation but also a warning that attackers may develop exploits soon.
Mitigation Recommendations
European organizations using Wimi Teamwork should immediately verify their software version and upgrade to version 7.38.17 or later once available. Until patches are released, organizations should implement additional CSRF protections such as enforcing strict same-origin policies, using Content Security Policy (CSP) headers to restrict external content, and educating users to avoid clicking on suspicious links or visiting untrusted websites while authenticated. Network-level controls like web application firewalls (WAFs) can be configured to detect and block suspicious JSON POST requests containing 'csrf_token' fields from untrusted sources. Multi-factor authentication (MFA) should be enforced to reduce the impact of compromised accounts. Regular monitoring of API logs for unusual activity patterns can help detect exploitation attempts early. Finally, organizations should coordinate with Cloud Solutions SAS for timely patch deployment and stay informed about any emerging exploits or advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff8e44ba6dffc5e2ff0b8e
Added to database: 10/27/2025, 3:22:44 PM
Last enriched: 11/3/2025, 4:15:15 PM
Last updated: 12/11/2025, 9:16:57 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7096: SQL Injection in code-projects Faculty Management System
MediumCVE-2025-64701: Privilege chaining in QualitySoft Corporation QND Premium/Advance/Standard
HighCVE-2025-14512: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-67694
UnknownCVE-2025-67693
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.