Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42616: CWE-352 Cross-Site Request Forgery (CSRF) in CIRCL Vulnerability-Lookup

0
High
VulnerabilityCVE-2025-42616cvecve-2025-42616cwe-352
Published: Mon Dec 08 2025 (12/08/2025, 12:09:22 UTC)
Source: CVE Database V5
Vendor/Project: CIRCL
Product: Vulnerability-Lookup

Description

Some endpoints in vulnerability-lookup that modified application state (e.g. changing database entries, user data, configurations, or other privileged actions) may have been accessible via HTTP GET requests without requiring a CSRF token. This flaw leaves the application vulnerable to Cross-Site Request Forgery (CSRF) attacks: an attacker who tricks a logged-in user into visiting a malicious website could cause the user’s browser to issue GET requests that perform unintended state-changing operations in the context of their authenticated session. Because the server would treat these GET requests as valid (since no CSRF protection or POST method enforcement was in place), the attacker could exploit this to escalate privileges, change settings, or carry out other unauthorized actions without needing the user’s explicit consent or awareness.  The fix ensures that all state-changing endpoints now require HTTP POST requests and include a valid CSRF token. This enforces that state changes cannot be triggered by arbitrary cross-site GET requests. This issue affects Vulnerability-Lookup: before 2.18.0.

AI-Powered Analysis

AILast updated: 12/08/2025, 12:27:44 UTC

Technical Analysis

CVE-2025-42616 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CIRCL Vulnerability-Lookup application versions before 2.18.0. The vulnerability stems from certain endpoints that modify application state—such as database entries, user data, or configurations—being accessible via HTTP GET requests without requiring a CSRF token. Normally, state-changing operations should be protected by requiring POST requests and validating CSRF tokens to ensure that requests originate from legitimate users. However, in this case, the application accepted GET requests for these operations, which violates RESTful best practices and security principles. An attacker can exploit this by luring an authenticated user to a malicious website that triggers crafted GET requests, causing the user's browser to unknowingly perform unauthorized actions within their authenticated session. This could include privilege escalation, unauthorized configuration changes, or other malicious modifications. The vulnerability is rated high severity with a CVSS 4.0 score of 7.0, reflecting its network attack vector, low attack complexity, partial authentication required, user interaction needed, and high impact on confidentiality and integrity. The patch released in version 2.18.0 enforces that all state-changing endpoints require HTTP POST methods and valid CSRF tokens, effectively mitigating the risk by preventing cross-site GET request exploitation. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk if left unpatched, especially in environments where users have elevated privileges or sensitive configurations are managed via Vulnerability-Lookup.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized changes in security configurations, user privileges, or critical vulnerability data managed through Vulnerability-Lookup. Such unauthorized modifications can undermine the integrity and confidentiality of vulnerability management processes, potentially allowing attackers to hide or manipulate vulnerability data, escalate privileges, or disrupt security operations. The exploitation requires an authenticated user to visit a malicious site, which is feasible in environments with web access and user interaction. Given the critical role of vulnerability management in cybersecurity, successful exploitation could weaken an organization's security posture, increase exposure to further attacks, and complicate incident response efforts. Organizations in sectors with stringent regulatory requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if unauthorized changes go undetected. Additionally, the vulnerability could be leveraged as part of a broader attack chain, amplifying its impact.

Mitigation Recommendations

European organizations should immediately upgrade Vulnerability-Lookup to version 2.18.0 or later, where the vulnerability is patched. Until the upgrade is applied, organizations should implement compensating controls such as restricting access to the Vulnerability-Lookup application to trusted networks and users, employing web application firewalls (WAFs) to detect and block suspicious GET requests that attempt state changes, and enforcing strict session management and monitoring for unusual activity. Security teams should audit logs for unexpected state-changing operations initiated via GET requests. User education to avoid clicking on untrusted links while authenticated can reduce risk. Additionally, reviewing and hardening CSRF protections across all web applications, ensuring that all state-changing endpoints require POST methods and CSRF tokens, will help prevent similar vulnerabilities. Regular vulnerability scanning and penetration testing should verify the effectiveness of these mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2025-04-16T12:34:02.866Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936c3245f72f49d1523dfda

Added to database: 12/8/2025, 12:23:00 PM

Last enriched: 12/8/2025, 12:27:44 PM

Last updated: 12/8/2025, 4:55:26 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats