Skip to main content

CVE-2025-49511: CWE-352 Cross-Site Request Forgery (CSRF) in uxper Civi Framework

High
VulnerabilityCVE-2025-49511cvecve-2025-49511cwe-352
Published: Tue Jun 10 2025 (06/10/2025, 12:35:33 UTC)
Source: CVE Database V5
Vendor/Project: uxper
Product: Civi Framework

Description

Cross-Site Request Forgery (CSRF) vulnerability in uxper Civi Framework allows Cross Site Request Forgery.This issue affects Civi Framework: from n/a through 2.1.6.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:31:59 UTC

Technical Analysis

CVE-2025-49511 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the uxper Civi Framework, affecting versions up to and including 2.1.6. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application in which they are currently authenticated. This can result in unauthorized actions being performed on behalf of the user without their consent. The vulnerability is classified under CWE-352, indicating a failure to implement proper anti-CSRF tokens or other protective mechanisms to validate the legitimacy of requests. According to the CVSS 3.1 scoring, this vulnerability has a score of 7.1 (high severity), with the vector indicating it is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact primarily affects the integrity and availability of the system, with no direct confidentiality loss. The vulnerability scope is unchanged (S:U), meaning the exploit affects resources managed by the vulnerable component itself. Although no known exploits are currently reported in the wild, the lack of patches or mitigations at the time of publication increases the risk for organizations using the affected versions. The uxper Civi Framework is a web application framework, and the CSRF vulnerability could allow attackers to perform unauthorized state-changing operations such as modifying user settings, submitting forms, or triggering administrative actions if the victim is logged in. This can lead to service disruption or unauthorized modifications within the application environment.

Potential Impact

For European organizations using the uxper Civi Framework, this vulnerability poses a significant risk to the integrity and availability of their web applications. Organizations relying on this framework for critical business processes or customer-facing services could experience unauthorized changes or disruptions, potentially leading to operational downtime or reputational damage. Since CSRF attacks exploit authenticated sessions, users with elevated privileges (e.g., administrators) are at particular risk, which could escalate the impact to broader system compromise or data manipulation. Given the high CVSS score and the nature of CSRF attacks, organizations in sectors such as government, finance, healthcare, and e-commerce in Europe could face increased exposure, especially if they have not implemented additional CSRF protections or if patching is delayed. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public. Furthermore, the requirement for user interaction means phishing or social engineering techniques could be used to facilitate exploitation, which remains a common attack vector in Europe.

Mitigation Recommendations

European organizations should immediately assess their use of the uxper Civi Framework and identify affected versions (up to 2.1.6). Since no official patches are currently available, organizations should implement compensating controls such as enforcing strict anti-CSRF tokens on all state-changing requests, validating the Origin and Referer headers to ensure requests originate from trusted sources, and employing Content Security Policy (CSP) to reduce the risk of malicious script execution. Additionally, organizations should educate users about phishing and social engineering risks to minimize the likelihood of user interaction facilitating exploitation. Monitoring web application logs for unusual or unauthorized requests can help detect attempted exploitation. Where feasible, restricting user privileges to the minimum necessary can limit the impact of successful CSRF attacks. Organizations should also stay alert for vendor updates or patches and apply them promptly once released. Finally, employing web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-06T10:33:37.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f571b0bd07c3938a70c

Added to database: 6/10/2025, 6:54:15 PM

Last enriched: 7/11/2025, 1:31:59 AM

Last updated: 8/7/2025, 12:33:43 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats