Skip to main content

CVE-2025-49237: CWE-352 Cross-Site Request Forgery (CSRF) in POEditor POEditor

High
VulnerabilityCVE-2025-49237cvecve-2025-49237cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:53:32 UTC)
Source: CVE Database V5
Vendor/Project: POEditor
Product: POEditor

Description

Cross-Site Request Forgery (CSRF) vulnerability in POEditor POEditor allows Path Traversal. This issue affects POEditor: from n/a through 0.9.10.

AI-Powered Analysis

AILast updated: 07/07/2025, 20:26:56 UTC

Technical Analysis

CVE-2025-49237 is a high-severity vulnerability identified in the POEditor platform, specifically affecting versions up to 0.9.10. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Notably, this CSRF vulnerability facilitates a path traversal attack vector, which can lead to significant disruption. The CVSS 3.1 base score of 7.4 reflects the combination of network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), with a scope change (S:C) and a high impact on availability (A:H), while confidentiality and integrity remain unaffected. This means an attacker can remotely exploit the vulnerability without prior authentication but needs the user to interact (e.g., click a malicious link). The path traversal aspect suggests that the attacker can manipulate file system paths, potentially causing denial of service or other availability impacts by accessing or modifying files outside the intended directory structure. Since no patches are currently linked, the vulnerability remains unmitigated in affected versions. The lack of known exploits in the wild indicates it is not yet actively weaponized but poses a significant risk if exploited.

Potential Impact

For European organizations using POEditor, especially those relying on it for localization and translation management, this vulnerability could lead to service disruptions or denial of service conditions, impacting business continuity. The path traversal enabled by CSRF could allow attackers to interfere with the application's file system, potentially causing outages or data loss related to translation files. Although confidentiality and integrity are not directly impacted, the availability impact could disrupt workflows, delay product releases, and affect customer-facing services dependent on localized content. Organizations with web-facing POEditor instances are particularly at risk, as the vulnerability can be exploited remotely without authentication but requires user interaction, increasing the risk in environments with less stringent user security awareness. Given the collaborative nature of translation platforms, the attack surface may include multiple users, amplifying potential impact.

Mitigation Recommendations

Organizations should immediately review their use of POEditor and restrict access to trusted users only. Implementing strict Content Security Policy (CSP) headers and SameSite cookie attributes can reduce CSRF risks by limiting cross-origin requests. Additionally, disabling or limiting user interactions that can trigger CSRF attacks, such as unsolicited link clicks, through user training and awareness campaigns is critical. Network-level protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious requests containing path traversal patterns. Since no official patches are currently available, organizations should consider isolating POEditor instances from critical infrastructure and monitoring logs for unusual file access patterns. Regular backups of translation data are recommended to mitigate potential data loss. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:40:52.585Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842eddf71f4d251b5c880ad

Added to database: 6/6/2025, 1:32:15 PM

Last enriched: 7/7/2025, 8:26:56 PM

Last updated: 8/11/2025, 1:58:25 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats