CVE-2025-49237: CWE-352 Cross-Site Request Forgery (CSRF) in POEditor POEditor
Cross-Site Request Forgery (CSRF) vulnerability in POEditor POEditor allows Path Traversal. This issue affects POEditor: from n/a through 0.9.10.
AI Analysis
Technical Summary
CVE-2025-49237 is a high-severity vulnerability identified in the POEditor platform, specifically affecting versions up to 0.9.10. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Notably, this CSRF vulnerability facilitates a path traversal attack vector, which can lead to significant disruption. The CVSS 3.1 base score of 7.4 reflects the combination of network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), with a scope change (S:C) and a high impact on availability (A:H), while confidentiality and integrity remain unaffected. This means an attacker can remotely exploit the vulnerability without prior authentication but needs the user to interact (e.g., click a malicious link). The path traversal aspect suggests that the attacker can manipulate file system paths, potentially causing denial of service or other availability impacts by accessing or modifying files outside the intended directory structure. Since no patches are currently linked, the vulnerability remains unmitigated in affected versions. The lack of known exploits in the wild indicates it is not yet actively weaponized but poses a significant risk if exploited.
Potential Impact
For European organizations using POEditor, especially those relying on it for localization and translation management, this vulnerability could lead to service disruptions or denial of service conditions, impacting business continuity. The path traversal enabled by CSRF could allow attackers to interfere with the application's file system, potentially causing outages or data loss related to translation files. Although confidentiality and integrity are not directly impacted, the availability impact could disrupt workflows, delay product releases, and affect customer-facing services dependent on localized content. Organizations with web-facing POEditor instances are particularly at risk, as the vulnerability can be exploited remotely without authentication but requires user interaction, increasing the risk in environments with less stringent user security awareness. Given the collaborative nature of translation platforms, the attack surface may include multiple users, amplifying potential impact.
Mitigation Recommendations
Organizations should immediately review their use of POEditor and restrict access to trusted users only. Implementing strict Content Security Policy (CSP) headers and SameSite cookie attributes can reduce CSRF risks by limiting cross-origin requests. Additionally, disabling or limiting user interactions that can trigger CSRF attacks, such as unsolicited link clicks, through user training and awareness campaigns is critical. Network-level protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious requests containing path traversal patterns. Since no official patches are currently available, organizations should consider isolating POEditor instances from critical infrastructure and monitoring logs for unusual file access patterns. Regular backups of translation data are recommended to mitigate potential data loss. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium
CVE-2025-49237: CWE-352 Cross-Site Request Forgery (CSRF) in POEditor POEditor
Description
Cross-Site Request Forgery (CSRF) vulnerability in POEditor POEditor allows Path Traversal. This issue affects POEditor: from n/a through 0.9.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-49237 is a high-severity vulnerability identified in the POEditor platform, specifically affecting versions up to 0.9.10. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Notably, this CSRF vulnerability facilitates a path traversal attack vector, which can lead to significant disruption. The CVSS 3.1 base score of 7.4 reflects the combination of network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), with a scope change (S:C) and a high impact on availability (A:H), while confidentiality and integrity remain unaffected. This means an attacker can remotely exploit the vulnerability without prior authentication but needs the user to interact (e.g., click a malicious link). The path traversal aspect suggests that the attacker can manipulate file system paths, potentially causing denial of service or other availability impacts by accessing or modifying files outside the intended directory structure. Since no patches are currently linked, the vulnerability remains unmitigated in affected versions. The lack of known exploits in the wild indicates it is not yet actively weaponized but poses a significant risk if exploited.
Potential Impact
For European organizations using POEditor, especially those relying on it for localization and translation management, this vulnerability could lead to service disruptions or denial of service conditions, impacting business continuity. The path traversal enabled by CSRF could allow attackers to interfere with the application's file system, potentially causing outages or data loss related to translation files. Although confidentiality and integrity are not directly impacted, the availability impact could disrupt workflows, delay product releases, and affect customer-facing services dependent on localized content. Organizations with web-facing POEditor instances are particularly at risk, as the vulnerability can be exploited remotely without authentication but requires user interaction, increasing the risk in environments with less stringent user security awareness. Given the collaborative nature of translation platforms, the attack surface may include multiple users, amplifying potential impact.
Mitigation Recommendations
Organizations should immediately review their use of POEditor and restrict access to trusted users only. Implementing strict Content Security Policy (CSP) headers and SameSite cookie attributes can reduce CSRF risks by limiting cross-origin requests. Additionally, disabling or limiting user interactions that can trigger CSRF attacks, such as unsolicited link clicks, through user training and awareness campaigns is critical. Network-level protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious requests containing path traversal patterns. Since no official patches are currently available, organizations should consider isolating POEditor instances from critical infrastructure and monitoring logs for unusual file access patterns. Regular backups of translation data are recommended to mitigate potential data loss. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:40:52.585Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842eddf71f4d251b5c880ad
Added to database: 6/6/2025, 1:32:15 PM
Last enriched: 7/7/2025, 8:26:56 PM
Last updated: 8/11/2025, 1:58:25 AM
Views: 12
Related Threats
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.