Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49346: CWE-352 Cross-Site Request Forgery (CSRF) in Peter Sterling Simple Archive Generator

0
High
VulnerabilityCVE-2025-49346cvecve-2025-49346cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 04:37:01 UTC)
Source: CVE Database V5
Vendor/Project: Peter Sterling
Product: Simple Archive Generator

Description

Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Simple Archive Generator allows Stored XSS.This issue affects Simple Archive Generator: from n/a through 5.2.

AI-Powered Analysis

AILast updated: 12/31/2025, 18:14:07 UTC

Technical Analysis

The vulnerability identified as CVE-2025-49346 affects the Simple Archive Generator software developed by Peter Sterling, specifically versions up to 5.2. It is classified as a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352), which enables attackers to trick authenticated users into submitting unauthorized requests to the web application. This can lead to Stored Cross-Site Scripting (XSS), where malicious scripts are permanently stored on the target server and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but combined pose a significant threat. No patches or fixes have been released yet, and no known exploits are reported in the wild. The vulnerability arises due to insufficient validation of requests, allowing attackers to craft malicious links or forms that, when visited or submitted by authenticated users, execute unauthorized actions and inject persistent malicious scripts. This can lead to session hijacking, data theft, or further compromise of the affected system.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized actions being performed on critical systems, data leakage through stored XSS, and potential compromise of user sessions. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR due to potential data breaches. Organizations relying on Simple Archive Generator for archiving or document management may face integrity and availability issues if attackers manipulate or corrupt stored archives. The combined CSRF and stored XSS vector increases the risk of widespread impact within networks where the software is deployed. Additionally, sectors such as government, finance, and healthcare in Europe, which often handle sensitive data and require high integrity, could be particularly affected. The absence of patches increases the window of exposure, necessitating immediate defensive measures.

Mitigation Recommendations

European organizations should implement several specific mitigations: 1) Deploy web application firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns targeting Simple Archive Generator endpoints. 2) Enforce strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 3) Disable or restrict the use of the vulnerable software version until an official patch is released. 4) Implement multi-factor authentication (MFA) to reduce the risk of session hijacking. 5) Conduct thorough input validation and output encoding on all user-supplied data within the application. 6) Educate users to avoid clicking suspicious links or submitting untrusted forms while authenticated. 7) Monitor logs for unusual activities indicative of CSRF or XSS exploitation attempts. 8) If possible, isolate the Simple Archive Generator environment from critical network segments to limit lateral movement. 9) Engage with the vendor or community to track patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:34.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69556460db813ff03ef78082

Added to database: 12/31/2025, 5:58:56 PM

Last enriched: 12/31/2025, 6:14:07 PM

Last updated: 1/8/2026, 7:21:29 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats