Skip to main content

CVE-2025-47639: CWE-352 Cross-Site Request Forgery (CSRF) in Supertext Supertext Translation and Proofreading

High
VulnerabilityCVE-2025-47639cvecve-2025-47639cwe-352
Published: Wed May 07 2025 (05/07/2025, 14:20:41 UTC)
Source: CVE
Vendor/Project: Supertext
Product: Supertext Translation and Proofreading

Description

Cross-Site Request Forgery (CSRF) vulnerability in Supertext Supertext Translation and Proofreading allows Stored XSS. This issue affects Supertext Translation and Proofreading: from n/a through 4.25.

AI-Powered Analysis

AILast updated: 07/05/2025, 11:42:40 UTC

Technical Analysis

CVE-2025-47639 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Supertext Translation and Proofreading software, affecting versions up to 4.25. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw enables Stored Cross-Site Scripting (XSS) attacks, where malicious scripts can be injected and persist within the application. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant compromise of user sessions and data integrity. The absence of patches at the time of publication indicates that the vulnerability remains unmitigated, increasing risk. The vulnerability arises from improper validation of requests, allowing attackers to trick authenticated users into executing unwanted actions, which then store malicious scripts that can affect other users or the same user in subsequent sessions. This can lead to session hijacking, data theft, or manipulation within the Supertext platform.

Potential Impact

For European organizations using Supertext Translation and Proofreading, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive translation and proofreading data, which may include proprietary or personal information. The Stored XSS resulting from CSRF can lead to session hijacking, unauthorized data modification, or leakage of confidential documents. Given that Supertext is used in professional language services, compromised data could affect client trust and violate data protection regulations such as GDPR. Additionally, attackers could leverage this vulnerability to propagate malware or phishing campaigns within organizations. The availability impact, while rated low individually, could escalate if attackers disrupt service or cause denial of service through malicious payloads. The requirement for user interaction means phishing or social engineering could be used to exploit the vulnerability, increasing the risk in environments where users are less security-aware. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

Organizations should implement strict CSRF protections such as synchronizer tokens or double-submit cookies within the Supertext application environment. Until official patches are released, applying web application firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns can reduce risk. User training to recognize phishing attempts and suspicious links is critical to prevent exploitation requiring user interaction. Network segmentation and least privilege principles should be enforced to limit the impact of any successful exploit. Monitoring and logging of user actions within Supertext can help detect anomalous behavior indicative of exploitation. If possible, disabling or restricting features that allow user-generated content or script execution until patches are available can reduce attack surface. Organizations should maintain close communication with Supertext for timely patch deployment once available. Finally, conducting regular security assessments and penetration tests focused on CSRF and XSS vectors in the application environment is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:45:05.653Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd92f3

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 11:42:40 AM

Last updated: 7/27/2025, 3:16:08 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats