CVE-2025-53312: CWE-352 Cross-Site Request Forgery (CSRF) in Looks Awesome OnionBuzz
Cross-Site Request Forgery (CSRF) vulnerability in Looks Awesome OnionBuzz allows Stored XSS. This issue affects OnionBuzz: from n/a through 1.0.7.
AI Analysis
Technical Summary
CVE-2025-53312 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Looks Awesome OnionBuzz product, affecting versions up to 1.0.7. The vulnerability is classified under CWE-352, which pertains to CSRF attacks. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application, potentially causing unauthorized actions on behalf of the user. In this case, the CSRF vulnerability in OnionBuzz can be leveraged to execute Stored Cross-Site Scripting (Stored XSS) attacks. Stored XSS occurs when malicious scripts are permanently stored on the target server (e.g., in a database) and executed in the context of users’ browsers when they access affected pages. The CVSS 3.1 base score of 7.1 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low to low-medium, but the combined effect of CSRF enabling Stored XSS can lead to session hijacking, data theft, or unauthorized actions. No patches or known exploits in the wild are currently reported, but the vulnerability is published and should be addressed promptly. The vulnerability affects OnionBuzz versions up to 1.0.7, but the exact range is not fully specified (noted as "n/a" in affected versions).
Potential Impact
For European organizations using OnionBuzz, this vulnerability poses a significant risk, especially for those deploying the affected versions in public-facing web environments. The CSRF vulnerability combined with Stored XSS can lead to unauthorized actions performed with the privileges of authenticated users, potentially compromising user accounts, leaking sensitive information, or enabling further attacks such as privilege escalation or lateral movement within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks if personal or sensitive data is exposed. Additionally, the exploitation of this vulnerability could damage organizational reputation and trust, especially if customer data or internal systems are compromised. Since the attack requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk in environments with less security awareness. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
1. Implement strict anti-CSRF tokens in all state-changing requests within OnionBuzz to ensure that requests originate from legitimate users. 2. Employ Content Security Policy (CSP) headers to reduce the impact of Stored XSS by restricting the execution of unauthorized scripts. 3. Conduct thorough input validation and output encoding on all user-supplied data to prevent injection of malicious scripts. 4. Restrict the use of cookies with the SameSite attribute set to 'Strict' or 'Lax' to mitigate CSRF risks. 5. Educate users about phishing and social engineering tactics to reduce the likelihood of user interaction triggering the exploit. 6. Monitor web application logs for unusual or suspicious requests that may indicate exploitation attempts. 7. If possible, isolate or limit the deployment of affected OnionBuzz versions in critical environments until patches are available. 8. Engage with the vendor or community to obtain or expedite patches and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-53312: CWE-352 Cross-Site Request Forgery (CSRF) in Looks Awesome OnionBuzz
Description
Cross-Site Request Forgery (CSRF) vulnerability in Looks Awesome OnionBuzz allows Stored XSS. This issue affects OnionBuzz: from n/a through 1.0.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-53312 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Looks Awesome OnionBuzz product, affecting versions up to 1.0.7. The vulnerability is classified under CWE-352, which pertains to CSRF attacks. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application, potentially causing unauthorized actions on behalf of the user. In this case, the CSRF vulnerability in OnionBuzz can be leveraged to execute Stored Cross-Site Scripting (Stored XSS) attacks. Stored XSS occurs when malicious scripts are permanently stored on the target server (e.g., in a database) and executed in the context of users’ browsers when they access affected pages. The CVSS 3.1 base score of 7.1 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low to low-medium, but the combined effect of CSRF enabling Stored XSS can lead to session hijacking, data theft, or unauthorized actions. No patches or known exploits in the wild are currently reported, but the vulnerability is published and should be addressed promptly. The vulnerability affects OnionBuzz versions up to 1.0.7, but the exact range is not fully specified (noted as "n/a" in affected versions).
Potential Impact
For European organizations using OnionBuzz, this vulnerability poses a significant risk, especially for those deploying the affected versions in public-facing web environments. The CSRF vulnerability combined with Stored XSS can lead to unauthorized actions performed with the privileges of authenticated users, potentially compromising user accounts, leaking sensitive information, or enabling further attacks such as privilege escalation or lateral movement within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks if personal or sensitive data is exposed. Additionally, the exploitation of this vulnerability could damage organizational reputation and trust, especially if customer data or internal systems are compromised. Since the attack requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk in environments with less security awareness. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
1. Implement strict anti-CSRF tokens in all state-changing requests within OnionBuzz to ensure that requests originate from legitimate users. 2. Employ Content Security Policy (CSP) headers to reduce the impact of Stored XSS by restricting the execution of unauthorized scripts. 3. Conduct thorough input validation and output encoding on all user-supplied data to prevent injection of malicious scripts. 4. Restrict the use of cookies with the SameSite attribute set to 'Strict' or 'Lax' to mitigate CSRF risks. 5. Educate users about phishing and social engineering tactics to reduce the likelihood of user interaction triggering the exploit. 6. Monitor web application logs for unusual or suspicious requests that may indicate exploitation attempts. 7. If possible, isolate or limit the deployment of affected OnionBuzz versions in critical environments until patches are available. 8. Engage with the vendor or community to obtain or expedite patches and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-27T11:59:06.867Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685ea033f6cf9081996a79ec
Added to database: 6/27/2025, 1:44:19 PM
Last enriched: 6/27/2025, 1:59:14 PM
Last updated: 8/5/2025, 5:21:06 AM
Views: 11
Related Threats
CVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowCVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.