CVE-2025-42616: CWE-352 Cross-Site Request Forgery (CSRF) in CIRCL Vulnerability-Lookup
Some endpoints in vulnerability-lookup that modified application state (e.g. changing database entries, user data, configurations, or other privileged actions) may have been accessible via HTTP GET requests without requiring a CSRF token. This flaw leaves the application vulnerable to Cross-Site Request Forgery (CSRF) attacks: an attacker who tricks a logged-in user into visiting a malicious website could cause the user’s browser to issue GET requests that perform unintended state-changing operations in the context of their authenticated session. Because the server would treat these GET requests as valid (since no CSRF protection or POST method enforcement was in place), the attacker could exploit this to escalate privileges, change settings, or carry out other unauthorized actions without needing the user’s explicit consent or awareness. The fix ensures that all state-changing endpoints now require HTTP POST requests and include a valid CSRF token. This enforces that state changes cannot be triggered by arbitrary cross-site GET requests. This issue affects Vulnerability-Lookup: before 2.18.0.
AI Analysis
Technical Summary
CVE-2025-42616 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CIRCL Vulnerability-Lookup application versions before 2.18.0. The vulnerability stems from certain endpoints that modify application state—such as database entries, user data, or configurations—being accessible via HTTP GET requests without requiring a CSRF token. Normally, state-changing operations should be protected by requiring POST requests and validating CSRF tokens to ensure that requests originate from legitimate users. However, in this case, the application accepted GET requests for these operations, which violates RESTful best practices and security principles. An attacker can exploit this by luring an authenticated user to a malicious website that triggers crafted GET requests, causing the user's browser to unknowingly perform unauthorized actions within their authenticated session. This could include privilege escalation, unauthorized configuration changes, or other malicious modifications. The vulnerability is rated high severity with a CVSS 4.0 score of 7.0, reflecting its network attack vector, low attack complexity, partial authentication required, user interaction needed, and high impact on confidentiality and integrity. The patch released in version 2.18.0 enforces that all state-changing endpoints require HTTP POST methods and valid CSRF tokens, effectively mitigating the risk by preventing cross-site GET request exploitation. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk if left unpatched, especially in environments where users have elevated privileges or sensitive configurations are managed via Vulnerability-Lookup.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized changes in security configurations, user privileges, or critical vulnerability data managed through Vulnerability-Lookup. Such unauthorized modifications can undermine the integrity and confidentiality of vulnerability management processes, potentially allowing attackers to hide or manipulate vulnerability data, escalate privileges, or disrupt security operations. The exploitation requires an authenticated user to visit a malicious site, which is feasible in environments with web access and user interaction. Given the critical role of vulnerability management in cybersecurity, successful exploitation could weaken an organization's security posture, increase exposure to further attacks, and complicate incident response efforts. Organizations in sectors with stringent regulatory requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if unauthorized changes go undetected. Additionally, the vulnerability could be leveraged as part of a broader attack chain, amplifying its impact.
Mitigation Recommendations
European organizations should immediately upgrade Vulnerability-Lookup to version 2.18.0 or later, where the vulnerability is patched. Until the upgrade is applied, organizations should implement compensating controls such as restricting access to the Vulnerability-Lookup application to trusted networks and users, employing web application firewalls (WAFs) to detect and block suspicious GET requests that attempt state changes, and enforcing strict session management and monitoring for unusual activity. Security teams should audit logs for unexpected state-changing operations initiated via GET requests. User education to avoid clicking on untrusted links while authenticated can reduce risk. Additionally, reviewing and hardening CSRF protections across all web applications, ensuring that all state-changing endpoints require POST methods and CSRF tokens, will help prevent similar vulnerabilities. Regular vulnerability scanning and penetration testing should verify the effectiveness of these mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-42616: CWE-352 Cross-Site Request Forgery (CSRF) in CIRCL Vulnerability-Lookup
Description
Some endpoints in vulnerability-lookup that modified application state (e.g. changing database entries, user data, configurations, or other privileged actions) may have been accessible via HTTP GET requests without requiring a CSRF token. This flaw leaves the application vulnerable to Cross-Site Request Forgery (CSRF) attacks: an attacker who tricks a logged-in user into visiting a malicious website could cause the user’s browser to issue GET requests that perform unintended state-changing operations in the context of their authenticated session. Because the server would treat these GET requests as valid (since no CSRF protection or POST method enforcement was in place), the attacker could exploit this to escalate privileges, change settings, or carry out other unauthorized actions without needing the user’s explicit consent or awareness. The fix ensures that all state-changing endpoints now require HTTP POST requests and include a valid CSRF token. This enforces that state changes cannot be triggered by arbitrary cross-site GET requests. This issue affects Vulnerability-Lookup: before 2.18.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-42616 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CIRCL Vulnerability-Lookup application versions before 2.18.0. The vulnerability stems from certain endpoints that modify application state—such as database entries, user data, or configurations—being accessible via HTTP GET requests without requiring a CSRF token. Normally, state-changing operations should be protected by requiring POST requests and validating CSRF tokens to ensure that requests originate from legitimate users. However, in this case, the application accepted GET requests for these operations, which violates RESTful best practices and security principles. An attacker can exploit this by luring an authenticated user to a malicious website that triggers crafted GET requests, causing the user's browser to unknowingly perform unauthorized actions within their authenticated session. This could include privilege escalation, unauthorized configuration changes, or other malicious modifications. The vulnerability is rated high severity with a CVSS 4.0 score of 7.0, reflecting its network attack vector, low attack complexity, partial authentication required, user interaction needed, and high impact on confidentiality and integrity. The patch released in version 2.18.0 enforces that all state-changing endpoints require HTTP POST methods and valid CSRF tokens, effectively mitigating the risk by preventing cross-site GET request exploitation. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk if left unpatched, especially in environments where users have elevated privileges or sensitive configurations are managed via Vulnerability-Lookup.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized changes in security configurations, user privileges, or critical vulnerability data managed through Vulnerability-Lookup. Such unauthorized modifications can undermine the integrity and confidentiality of vulnerability management processes, potentially allowing attackers to hide or manipulate vulnerability data, escalate privileges, or disrupt security operations. The exploitation requires an authenticated user to visit a malicious site, which is feasible in environments with web access and user interaction. Given the critical role of vulnerability management in cybersecurity, successful exploitation could weaken an organization's security posture, increase exposure to further attacks, and complicate incident response efforts. Organizations in sectors with stringent regulatory requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if unauthorized changes go undetected. Additionally, the vulnerability could be leveraged as part of a broader attack chain, amplifying its impact.
Mitigation Recommendations
European organizations should immediately upgrade Vulnerability-Lookup to version 2.18.0 or later, where the vulnerability is patched. Until the upgrade is applied, organizations should implement compensating controls such as restricting access to the Vulnerability-Lookup application to trusted networks and users, employing web application firewalls (WAFs) to detect and block suspicious GET requests that attempt state changes, and enforcing strict session management and monitoring for unusual activity. Security teams should audit logs for unexpected state-changing operations initiated via GET requests. User education to avoid clicking on untrusted links while authenticated can reduce risk. Additionally, reviewing and hardening CSRF protections across all web applications, ensuring that all state-changing endpoints require POST methods and CSRF tokens, will help prevent similar vulnerabilities. Regular vulnerability scanning and penetration testing should verify the effectiveness of these mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ENISA
- Date Reserved
- 2025-04-16T12:34:02.866Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6936c3245f72f49d1523dfda
Added to database: 12/8/2025, 12:23:00 PM
Last enriched: 12/8/2025, 12:27:44 PM
Last updated: 12/8/2025, 4:55:26 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63721: n/a
UnknownCVE-2025-14256: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-65799: n/a
UnknownCVE-2025-65363: n/a
UnknownCVE-2025-65796: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.