CVE-2025-49346: CWE-352 Cross-Site Request Forgery (CSRF) in Peter Sterling Simple Archive Generator
Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Simple Archive Generator allows Stored XSS.This issue affects Simple Archive Generator: from n/a through 5.2.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-49346 affects the Simple Archive Generator software developed by Peter Sterling, specifically versions up to 5.2. It is classified as a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352), which enables attackers to trick authenticated users into submitting unauthorized requests to the web application. This can lead to Stored Cross-Site Scripting (XSS), where malicious scripts are permanently stored on the target server and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but combined pose a significant threat. No patches or fixes have been released yet, and no known exploits are reported in the wild. The vulnerability arises due to insufficient validation of requests, allowing attackers to craft malicious links or forms that, when visited or submitted by authenticated users, execute unauthorized actions and inject persistent malicious scripts. This can lead to session hijacking, data theft, or further compromise of the affected system.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized actions being performed on critical systems, data leakage through stored XSS, and potential compromise of user sessions. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR due to potential data breaches. Organizations relying on Simple Archive Generator for archiving or document management may face integrity and availability issues if attackers manipulate or corrupt stored archives. The combined CSRF and stored XSS vector increases the risk of widespread impact within networks where the software is deployed. Additionally, sectors such as government, finance, and healthcare in Europe, which often handle sensitive data and require high integrity, could be particularly affected. The absence of patches increases the window of exposure, necessitating immediate defensive measures.
Mitigation Recommendations
European organizations should implement several specific mitigations: 1) Deploy web application firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns targeting Simple Archive Generator endpoints. 2) Enforce strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 3) Disable or restrict the use of the vulnerable software version until an official patch is released. 4) Implement multi-factor authentication (MFA) to reduce the risk of session hijacking. 5) Conduct thorough input validation and output encoding on all user-supplied data within the application. 6) Educate users to avoid clicking suspicious links or submitting untrusted forms while authenticated. 7) Monitor logs for unusual activities indicative of CSRF or XSS exploitation attempts. 8) If possible, isolate the Simple Archive Generator environment from critical network segments to limit lateral movement. 9) Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-49346: CWE-352 Cross-Site Request Forgery (CSRF) in Peter Sterling Simple Archive Generator
Description
Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Simple Archive Generator allows Stored XSS.This issue affects Simple Archive Generator: from n/a through 5.2.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-49346 affects the Simple Archive Generator software developed by Peter Sterling, specifically versions up to 5.2. It is classified as a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352), which enables attackers to trick authenticated users into submitting unauthorized requests to the web application. This can lead to Stored Cross-Site Scripting (XSS), where malicious scripts are permanently stored on the target server and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but combined pose a significant threat. No patches or fixes have been released yet, and no known exploits are reported in the wild. The vulnerability arises due to insufficient validation of requests, allowing attackers to craft malicious links or forms that, when visited or submitted by authenticated users, execute unauthorized actions and inject persistent malicious scripts. This can lead to session hijacking, data theft, or further compromise of the affected system.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized actions being performed on critical systems, data leakage through stored XSS, and potential compromise of user sessions. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR due to potential data breaches. Organizations relying on Simple Archive Generator for archiving or document management may face integrity and availability issues if attackers manipulate or corrupt stored archives. The combined CSRF and stored XSS vector increases the risk of widespread impact within networks where the software is deployed. Additionally, sectors such as government, finance, and healthcare in Europe, which often handle sensitive data and require high integrity, could be particularly affected. The absence of patches increases the window of exposure, necessitating immediate defensive measures.
Mitigation Recommendations
European organizations should implement several specific mitigations: 1) Deploy web application firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns targeting Simple Archive Generator endpoints. 2) Enforce strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 3) Disable or restrict the use of the vulnerable software version until an official patch is released. 4) Implement multi-factor authentication (MFA) to reduce the risk of session hijacking. 5) Conduct thorough input validation and output encoding on all user-supplied data within the application. 6) Educate users to avoid clicking suspicious links or submitting untrusted forms while authenticated. 7) Monitor logs for unusual activities indicative of CSRF or XSS exploitation attempts. 8) If possible, isolate the Simple Archive Generator environment from critical network segments to limit lateral movement. 9) Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:34.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69556460db813ff03ef78082
Added to database: 12/31/2025, 5:58:56 PM
Last enriched: 12/31/2025, 6:14:07 PM
Last updated: 1/8/2026, 7:21:29 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.