Skip to main content

CVE-2025-53312: CWE-352 Cross-Site Request Forgery (CSRF) in Looks Awesome OnionBuzz

High
VulnerabilityCVE-2025-53312cvecve-2025-53312cwe-352
Published: Fri Jun 27 2025 (06/27/2025, 13:21:34 UTC)
Source: CVE Database V5
Vendor/Project: Looks Awesome
Product: OnionBuzz

Description

Cross-Site Request Forgery (CSRF) vulnerability in Looks Awesome OnionBuzz allows Stored XSS. This issue affects OnionBuzz: from n/a through 1.0.7.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:59:14 UTC

Technical Analysis

CVE-2025-53312 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Looks Awesome OnionBuzz product, affecting versions up to 1.0.7. The vulnerability is classified under CWE-352, which pertains to CSRF attacks. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application, potentially causing unauthorized actions on behalf of the user. In this case, the CSRF vulnerability in OnionBuzz can be leveraged to execute Stored Cross-Site Scripting (Stored XSS) attacks. Stored XSS occurs when malicious scripts are permanently stored on the target server (e.g., in a database) and executed in the context of users’ browsers when they access affected pages. The CVSS 3.1 base score of 7.1 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low to low-medium, but the combined effect of CSRF enabling Stored XSS can lead to session hijacking, data theft, or unauthorized actions. No patches or known exploits in the wild are currently reported, but the vulnerability is published and should be addressed promptly. The vulnerability affects OnionBuzz versions up to 1.0.7, but the exact range is not fully specified (noted as "n/a" in affected versions).

Potential Impact

For European organizations using OnionBuzz, this vulnerability poses a significant risk, especially for those deploying the affected versions in public-facing web environments. The CSRF vulnerability combined with Stored XSS can lead to unauthorized actions performed with the privileges of authenticated users, potentially compromising user accounts, leaking sensitive information, or enabling further attacks such as privilege escalation or lateral movement within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks if personal or sensitive data is exposed. Additionally, the exploitation of this vulnerability could damage organizational reputation and trust, especially if customer data or internal systems are compromised. Since the attack requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk in environments with less security awareness. The lack of available patches means organizations must rely on mitigation strategies until an official fix is released.

Mitigation Recommendations

1. Implement strict anti-CSRF tokens in all state-changing requests within OnionBuzz to ensure that requests originate from legitimate users. 2. Employ Content Security Policy (CSP) headers to reduce the impact of Stored XSS by restricting the execution of unauthorized scripts. 3. Conduct thorough input validation and output encoding on all user-supplied data to prevent injection of malicious scripts. 4. Restrict the use of cookies with the SameSite attribute set to 'Strict' or 'Lax' to mitigate CSRF risks. 5. Educate users about phishing and social engineering tactics to reduce the likelihood of user interaction triggering the exploit. 6. Monitor web application logs for unusual or suspicious requests that may indicate exploitation attempts. 7. If possible, isolate or limit the deployment of affected OnionBuzz versions in critical environments until patches are available. 8. Engage with the vendor or community to obtain or expedite patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T11:59:06.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ea033f6cf9081996a79ec

Added to database: 6/27/2025, 1:44:19 PM

Last enriched: 6/27/2025, 1:59:14 PM

Last updated: 8/5/2025, 5:21:06 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats