CVE-2025-46507: CWE-352 Cross-Site Request Forgery (CSRF) in ldrumm Unsafe Mimetypes
Cross-Site Request Forgery (CSRF) vulnerability in ldrumm Unsafe Mimetypes allows Stored XSS. This issue affects Unsafe Mimetypes: from n/a through 0.1.4.
AI Analysis
Technical Summary
CVE-2025-46507 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'Unsafe Mimetypes' product developed by ldrumm, affecting versions up to 0.1.4. The vulnerability is categorized under CWE-352, which involves an attacker tricking an authenticated user into submitting a forged request to a web application without their consent. This specific vulnerability allows an attacker to perform stored Cross-Site Scripting (XSS) attacks by exploiting the CSRF flaw. Stored XSS occurs when malicious scripts injected by an attacker are permanently stored on the target server, such as in a database or log, and then executed in the browsers of users who access the affected content. The combination of CSRF and stored XSS significantly increases the attack surface, as an attacker can leverage CSRF to inject malicious scripts that persist and execute in victim browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects the Unsafe Mimetypes product, which likely handles MIME type processing or filtering, although specific functionality details are not provided. No patches or fixes have been published yet, and there are no known exploits in the wild at this time. The vulnerability was publicly disclosed on April 24, 2025, and has been enriched by CISA, indicating recognition by a major cybersecurity authority. The absence of a CVSS score necessitates an independent severity assessment based on the potential impact and exploitability factors.
Potential Impact
For European organizations, the impact of CVE-2025-46507 can be significant, especially for those relying on the Unsafe Mimetypes product or related web applications that process MIME types and handle user-generated content. The stored XSS enabled by the CSRF vulnerability can lead to unauthorized execution of scripts in the context of authenticated users, potentially compromising user accounts, leaking sensitive data, or enabling further attacks such as privilege escalation or lateral movement within corporate networks. This can affect confidentiality by exposing personal or corporate information, integrity by allowing unauthorized changes to data or application behavior, and availability if attackers disrupt services through malicious scripts. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly sensitive to such attacks due to regulatory requirements like GDPR and the potential for reputational damage. The lack of known exploits currently reduces immediate risk, but the presence of a stored XSS vector combined with CSRF makes this vulnerability attractive for attackers once exploit code becomes available. Organizations with web-facing applications using this product or similar MIME type handling components should consider this a medium to high risk depending on exposure and user base.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, enforce strict anti-CSRF tokens on all state-changing requests to prevent unauthorized request forgery. Second, apply rigorous input validation and output encoding to mitigate stored XSS risks, ensuring that any user-supplied data is sanitized before storage and display. Third, conduct thorough code reviews and penetration testing focused on MIME type handling components to identify and remediate injection points. Fourth, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Fifth, monitor web application logs for unusual or suspicious requests indicative of exploitation attempts. Finally, maintain an inventory of affected software versions and plan for timely updates once patches become available. Organizations should also educate users about phishing and social engineering tactics that could facilitate CSRF attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-46507: CWE-352 Cross-Site Request Forgery (CSRF) in ldrumm Unsafe Mimetypes
Description
Cross-Site Request Forgery (CSRF) vulnerability in ldrumm Unsafe Mimetypes allows Stored XSS. This issue affects Unsafe Mimetypes: from n/a through 0.1.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-46507 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'Unsafe Mimetypes' product developed by ldrumm, affecting versions up to 0.1.4. The vulnerability is categorized under CWE-352, which involves an attacker tricking an authenticated user into submitting a forged request to a web application without their consent. This specific vulnerability allows an attacker to perform stored Cross-Site Scripting (XSS) attacks by exploiting the CSRF flaw. Stored XSS occurs when malicious scripts injected by an attacker are permanently stored on the target server, such as in a database or log, and then executed in the browsers of users who access the affected content. The combination of CSRF and stored XSS significantly increases the attack surface, as an attacker can leverage CSRF to inject malicious scripts that persist and execute in victim browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects the Unsafe Mimetypes product, which likely handles MIME type processing or filtering, although specific functionality details are not provided. No patches or fixes have been published yet, and there are no known exploits in the wild at this time. The vulnerability was publicly disclosed on April 24, 2025, and has been enriched by CISA, indicating recognition by a major cybersecurity authority. The absence of a CVSS score necessitates an independent severity assessment based on the potential impact and exploitability factors.
Potential Impact
For European organizations, the impact of CVE-2025-46507 can be significant, especially for those relying on the Unsafe Mimetypes product or related web applications that process MIME types and handle user-generated content. The stored XSS enabled by the CSRF vulnerability can lead to unauthorized execution of scripts in the context of authenticated users, potentially compromising user accounts, leaking sensitive data, or enabling further attacks such as privilege escalation or lateral movement within corporate networks. This can affect confidentiality by exposing personal or corporate information, integrity by allowing unauthorized changes to data or application behavior, and availability if attackers disrupt services through malicious scripts. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly sensitive to such attacks due to regulatory requirements like GDPR and the potential for reputational damage. The lack of known exploits currently reduces immediate risk, but the presence of a stored XSS vector combined with CSRF makes this vulnerability attractive for attackers once exploit code becomes available. Organizations with web-facing applications using this product or similar MIME type handling components should consider this a medium to high risk depending on exposure and user base.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, enforce strict anti-CSRF tokens on all state-changing requests to prevent unauthorized request forgery. Second, apply rigorous input validation and output encoding to mitigate stored XSS risks, ensuring that any user-supplied data is sanitized before storage and display. Third, conduct thorough code reviews and penetration testing focused on MIME type handling components to identify and remediate injection points. Fourth, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Fifth, monitor web application logs for unusual or suspicious requests indicative of exploitation attempts. Finally, maintain an inventory of affected software versions and plan for timely updates once patches become available. Organizations should also educate users about phishing and social engineering tactics that could facilitate CSRF attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-24T14:23:11.073Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf09ca
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 8:55:01 AM
Last updated: 8/18/2025, 5:32:23 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.