CVE-2025-47639: CWE-352 Cross-Site Request Forgery (CSRF) in Supertext Supertext Translation and Proofreading
Cross-Site Request Forgery (CSRF) vulnerability in Supertext Supertext Translation and Proofreading allows Stored XSS. This issue affects Supertext Translation and Proofreading: from n/a through 4.25.
AI Analysis
Technical Summary
CVE-2025-47639 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Supertext Translation and Proofreading software, affecting versions up to 4.25. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw enables Stored Cross-Site Scripting (XSS) attacks, where malicious scripts can be injected and persist within the application. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant compromise of user sessions and data integrity. The absence of patches at the time of publication indicates that the vulnerability remains unmitigated, increasing risk. The vulnerability arises from improper validation of requests, allowing attackers to trick authenticated users into executing unwanted actions, which then store malicious scripts that can affect other users or the same user in subsequent sessions. This can lead to session hijacking, data theft, or manipulation within the Supertext platform.
Potential Impact
For European organizations using Supertext Translation and Proofreading, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive translation and proofreading data, which may include proprietary or personal information. The Stored XSS resulting from CSRF can lead to session hijacking, unauthorized data modification, or leakage of confidential documents. Given that Supertext is used in professional language services, compromised data could affect client trust and violate data protection regulations such as GDPR. Additionally, attackers could leverage this vulnerability to propagate malware or phishing campaigns within organizations. The availability impact, while rated low individually, could escalate if attackers disrupt service or cause denial of service through malicious payloads. The requirement for user interaction means phishing or social engineering could be used to exploit the vulnerability, increasing the risk in environments where users are less security-aware. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
Organizations should implement strict CSRF protections such as synchronizer tokens or double-submit cookies within the Supertext application environment. Until official patches are released, applying web application firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns can reduce risk. User training to recognize phishing attempts and suspicious links is critical to prevent exploitation requiring user interaction. Network segmentation and least privilege principles should be enforced to limit the impact of any successful exploit. Monitoring and logging of user actions within Supertext can help detect anomalous behavior indicative of exploitation. If possible, disabling or restricting features that allow user-generated content or script execution until patches are available can reduce attack surface. Organizations should maintain close communication with Supertext for timely patch deployment once available. Finally, conducting regular security assessments and penetration tests focused on CSRF and XSS vectors in the application environment is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Belgium, Austria
CVE-2025-47639: CWE-352 Cross-Site Request Forgery (CSRF) in Supertext Supertext Translation and Proofreading
Description
Cross-Site Request Forgery (CSRF) vulnerability in Supertext Supertext Translation and Proofreading allows Stored XSS. This issue affects Supertext Translation and Proofreading: from n/a through 4.25.
AI-Powered Analysis
Technical Analysis
CVE-2025-47639 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Supertext Translation and Proofreading software, affecting versions up to 4.25. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, the CSRF flaw enables Stored Cross-Site Scripting (XSS) attacks, where malicious scripts can be injected and persist within the application. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant compromise of user sessions and data integrity. The absence of patches at the time of publication indicates that the vulnerability remains unmitigated, increasing risk. The vulnerability arises from improper validation of requests, allowing attackers to trick authenticated users into executing unwanted actions, which then store malicious scripts that can affect other users or the same user in subsequent sessions. This can lead to session hijacking, data theft, or manipulation within the Supertext platform.
Potential Impact
For European organizations using Supertext Translation and Proofreading, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive translation and proofreading data, which may include proprietary or personal information. The Stored XSS resulting from CSRF can lead to session hijacking, unauthorized data modification, or leakage of confidential documents. Given that Supertext is used in professional language services, compromised data could affect client trust and violate data protection regulations such as GDPR. Additionally, attackers could leverage this vulnerability to propagate malware or phishing campaigns within organizations. The availability impact, while rated low individually, could escalate if attackers disrupt service or cause denial of service through malicious payloads. The requirement for user interaction means phishing or social engineering could be used to exploit the vulnerability, increasing the risk in environments where users are less security-aware. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
Organizations should implement strict CSRF protections such as synchronizer tokens or double-submit cookies within the Supertext application environment. Until official patches are released, applying web application firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns can reduce risk. User training to recognize phishing attempts and suspicious links is critical to prevent exploitation requiring user interaction. Network segmentation and least privilege principles should be enforced to limit the impact of any successful exploit. Monitoring and logging of user actions within Supertext can help detect anomalous behavior indicative of exploitation. If possible, disabling or restricting features that allow user-generated content or script execution until patches are available can reduce attack surface. Organizations should maintain close communication with Supertext for timely patch deployment once available. Finally, conducting regular security assessments and penetration tests focused on CSRF and XSS vectors in the application environment is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:05.653Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd92f3
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 11:42:40 AM
Last updated: 7/27/2025, 3:16:08 AM
Views: 11
Related Threats
CVE-2025-55169: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
CriticalCVE-2025-43734: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-36124: CWE-268 Privilege Chaining in IBM WebSphere Application Server Liberty
MediumCVE-2025-55168: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-53744: Escalation of privilege in Fortinet FortiOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.