Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39416: Cross-Site Request Forgery (CSRF) in Ichi translit it!

0
Unknown
VulnerabilityCVE-2025-39416cvecve-2025-39416
Published: Thu Apr 17 2025 (04/17/2025, 15:17:12 UTC)
Source: CVE Database V5
Vendor/Project: Ichi
Product: translit it!

Description

Cross-Site Request Forgery (CSRF) vulnerability in Ichi translit it! translit-it allows Stored XSS.This issue affects translit it!: from n/a through <= 1.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:55:05 UTC

Technical Analysis

CVE-2025-39416 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Ichi translit it! software, specifically affecting all versions up to 1.6. The vulnerability allows an attacker to exploit the trust that the web application places in the authenticated user's browser by sending unauthorized commands on behalf of the user without their knowledge. The CSRF flaw facilitates stored Cross-Site Scripting (XSS), meaning that malicious scripts injected via crafted requests are stored persistently within the application and executed in the context of other users' browsers. This combination is particularly dangerous because it not only allows attackers to perform unauthorized actions but also to execute arbitrary JavaScript code persistently, potentially leading to session hijacking, data theft, or further exploitation of the affected system. The vulnerability does not require prior authentication by the attacker but does require the victim to be authenticated and to interact with a maliciously crafted webpage or link. No official patches or fixes have been released at the time of this report, and no known exploits have been observed in the wild. The absence of a CVSS score necessitates an independent severity assessment, considering the impact on confidentiality, integrity, and availability, the ease of exploitation, and the scope of affected systems. The vulnerability affects web applications using translit it!, which is a tool used for transliteration services, likely integrated into websites or web services that handle user input and display. The stored XSS aspect increases the risk profile as it can affect multiple users and persist over time. The vulnerability was published on April 17, 2025, by Patchstack, indicating credible reporting and tracking.

Potential Impact

The impact of CVE-2025-39416 is significant for organizations using the Ichi translit it! product, particularly those that rely on it for user-facing web services. Exploitation could lead to unauthorized actions performed on behalf of authenticated users, including changes to user data or application settings. The stored XSS component allows attackers to execute arbitrary JavaScript in the browsers of other users, potentially leading to session hijacking, credential theft, or distribution of malware. This can compromise the confidentiality and integrity of user data and the application environment. Additionally, the persistence of the XSS payload increases the attack surface and duration of exposure. Organizations may face reputational damage, regulatory penalties, and operational disruptions if the vulnerability is exploited. Since no patches are currently available, the risk remains until mitigations are implemented. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation. The vulnerability could be particularly impactful in sectors with sensitive data or high-value user interactions, such as finance, healthcare, and government services.

Mitigation Recommendations

To mitigate CVE-2025-39416, organizations should implement multiple layers of defense. First, enforce anti-CSRF tokens in all state-changing requests to ensure that requests originate from legitimate user interactions. Second, apply rigorous input validation and output encoding to prevent injection of malicious scripts, thereby mitigating stored XSS risks. Third, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in user browsers. Fourth, conduct regular security audits and code reviews focusing on authentication and session management mechanisms. Fifth, monitor web application logs and user activity for unusual patterns that may indicate exploitation attempts. Sixth, educate users about the risks of clicking on suspicious links, especially when authenticated. Finally, maintain close communication with the vendor for updates or patches and apply them promptly once available. If feasible, consider temporarily disabling or restricting the translit it! functionality until a fix is released. Employing Web Application Firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns can provide additional protection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:58.198Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73f1e6bfc5ba1def42d5

Added to database: 4/1/2026, 7:37:21 PM

Last enriched: 4/2/2026, 3:55:05 AM

Last updated: 4/3/2026, 1:25:29 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses