Skip to main content

CVE-2025-47551: CWE-352 Cross-Site Request Forgery (CSRF) in ctltwp Wiki Embed

Medium
VulnerabilityCVE-2025-47551cvecve-2025-47551cwe-352
Published: Wed May 07 2025 (05/07/2025, 14:20:20 UTC)
Source: CVE
Vendor/Project: ctltwp
Product: Wiki Embed

Description

Cross-Site Request Forgery (CSRF) vulnerability in ctltwp Wiki Embed allows Cross Site Request Forgery. This issue affects Wiki Embed: from n/a through 1.4.6.

AI-Powered Analysis

AILast updated: 07/05/2025, 11:26:52 UTC

Technical Analysis

CVE-2025-47551 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ctltwp Wiki Embed product, affecting versions up to 1.4.6. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to a web application in which the user is currently authenticated. This can lead to unauthorized actions being performed without the user's consent. In this case, the vulnerability exists because the Wiki Embed component does not adequately verify the origin or authenticity of requests that trigger state-changing operations. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be executed remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Since Wiki Embed is a web-based integration tool, this vulnerability could be exploited to perform unauthorized modifications or actions within the embedded wiki context if a user is tricked into clicking a malicious link or visiting a crafted webpage while authenticated. The lack of patches means organizations using affected versions remain exposed until mitigations or updates are applied.

Potential Impact

For European organizations, the primary impact of this CSRF vulnerability lies in the potential unauthorized modification of wiki content or configuration through forged requests. While the confidentiality and availability of systems are not directly affected, integrity breaches can lead to misinformation, defacement, or unauthorized changes that may disrupt collaboration or documentation workflows. This can be particularly problematic in sectors relying heavily on accurate and trusted internal knowledge bases, such as government agencies, research institutions, and regulated industries. Additionally, if the Wiki Embed component is integrated into larger enterprise platforms, the CSRF vulnerability could serve as a stepping stone for further attacks or social engineering campaigns. The requirement for user interaction means phishing or social engineering tactics could be used to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European organizations with web applications embedding Wiki Embed should be vigilant, as exploitation could undermine trust in internal documentation and potentially expose organizations to compliance risks if unauthorized changes affect regulated data or processes.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several practical mitigations: 1) Employ anti-CSRF tokens: Ensure that all state-changing requests in the Wiki Embed component require a unique, unpredictable token validated on the server side to prevent forged requests. 2) Implement SameSite cookies: Configure authentication cookies with the 'SameSite' attribute set to 'Strict' or 'Lax' to reduce the risk of cross-origin requests being accepted. 3) Use Content Security Policy (CSP): Restrict the domains that can execute scripts or send requests to the Wiki Embed endpoints to reduce the attack surface. 4) Educate users: Train users to recognize phishing attempts and avoid clicking suspicious links while authenticated to sensitive systems. 5) Monitor logs: Set up monitoring and alerting for unusual or unexpected requests to the Wiki Embed endpoints that could indicate exploitation attempts. 6) Isolate the Wiki Embed environment: Where possible, limit the integration scope and privileges of the Wiki Embed component to minimize potential damage from unauthorized actions. 7) Stay updated: Monitor vendor communications and security advisories for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:40:00.789Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd922f

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 11:26:52 AM

Last updated: 7/27/2025, 6:29:36 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats