Skip to main content

CVE-2025-52463: Cross-site request forgery (CSRF) in QUALITIA CO., LTD. Active! mail 6

Low
VulnerabilityCVE-2025-52463cvecve-2025-52463
Published: Wed Jul 02 2025 (07/02/2025, 05:02:48 UTC)
Source: CVE Database V5
Vendor/Project: QUALITIA CO., LTD.
Product: Active! mail 6

Description

Cross-site request forgery vulnerability exists in Active! mail 6 BuildInfo: 6.60.06008562 and earlier. If this vulnerability is exploited, unintended E-mail may be sent when a user accesses a specially crafted URL while being logged in.

AI-Powered Analysis

AILast updated: 07/02/2025, 05:24:32 UTC

Technical Analysis

CVE-2025-52463 is a Cross-Site Request Forgery (CSRF) vulnerability identified in QUALITIA CO., LTD.'s Active! mail 6, specifically in versions up to and including BuildInfo: 6.60.06008562. This vulnerability allows an attacker to induce an authenticated user to perform unintended actions by tricking them into visiting a maliciously crafted URL. In this case, the unintended action is the sending of emails without the user's explicit consent. The vulnerability arises because the application does not sufficiently verify that requests to send emails originate from legitimate user interactions within the application context. When a logged-in user accesses a specially crafted URL, the application processes the request as if it were legitimate, resulting in the transmission of potentially unauthorized emails. The CVSS v3.0 score is 3.1, indicating a low severity level. The vector string (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network without privileges but requires user interaction (clicking the crafted URL). The attack complexity is high, meaning that the attacker must craft a specific URL and lure the user into clicking it. The impact is limited to integrity, as unauthorized emails may be sent, but confidentiality and availability are not affected. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations using Active! mail 6, this vulnerability could lead to unauthorized emails being sent from legitimate user accounts. This could result in reputational damage, especially if the emails are used for phishing or spam campaigns that appear to originate from trusted internal sources. It may also lead to internal confusion or operational disruptions if automated processes rely on email communications. However, the low severity and requirement for user interaction limit the overall risk. Organizations with strict email policies or regulatory requirements around email integrity (e.g., GDPR implications if personal data is involved in the emails) should be cautious. Attackers could exploit this vulnerability to send misleading or malicious emails, potentially facilitating further social engineering attacks within the organization.

Mitigation Recommendations

To mitigate this vulnerability, organizations should apply any available patches or updates from QUALITIA CO., LTD. that address this CSRF issue. In the absence of patches, implementing anti-CSRF tokens in all state-changing requests, especially those that trigger email sending, is critical. Organizations should also enforce strict Content Security Policies (CSP) and SameSite cookie attributes to reduce the risk of CSRF attacks. User education is important to reduce the likelihood of clicking on suspicious links, especially those received via email or external sources. Additionally, monitoring outgoing email traffic for unusual patterns or volumes can help detect exploitation attempts. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious requests that resemble CSRF attack patterns. Finally, restricting the use of Active! mail 6 to trusted networks or VPNs can reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-06-18T04:20:36.054Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6864bf186f40f0eb72918bf9

Added to database: 7/2/2025, 5:09:44 AM

Last enriched: 7/2/2025, 5:24:32 AM

Last updated: 7/2/2025, 12:08:20 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats