Skip to main content

CVE-2025-53331: CWE-352 Cross-Site Request Forgery (CSRF) in samcharrington RSS Digest

High
VulnerabilityCVE-2025-53331cvecve-2025-53331cwe-352
Published: Fri Jun 27 2025 (06/27/2025, 13:21:42 UTC)
Source: CVE Database V5
Vendor/Project: samcharrington
Product: RSS Digest

Description

Cross-Site Request Forgery (CSRF) vulnerability in samcharrington RSS Digest allows Stored XSS. This issue affects RSS Digest: from n/a through 1.5.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:55:49 UTC

Technical Analysis

CVE-2025-53331 is a high-severity vulnerability affecting the samcharrington RSS Digest application, specifically versions up to 1.5. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. In this case, the CSRF vulnerability facilitates Stored Cross-Site Scripting (Stored XSS), allowing malicious scripts to be injected and persist within the application. The CVSS 3.1 base score of 7.1 reflects the network exploitable nature of the flaw (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact includes low confidentiality, integrity, and availability losses (C:L/I:L/A:L), consistent with the ability to execute malicious scripts and potentially manipulate user data or disrupt service. The vulnerability arises because the application does not properly verify the origin of requests, allowing attackers to craft malicious requests that users unknowingly execute. The Stored XSS component means that injected scripts can be stored on the server and executed whenever other users access the affected content, increasing the attack surface and potential damage. No patches or known exploits in the wild have been reported as of the publication date (June 27, 2025).

Potential Impact

For European organizations using samcharrington RSS Digest, this vulnerability poses significant risks. The Stored XSS enabled by CSRF can lead to session hijacking, credential theft, unauthorized actions, and the spread of malware within internal networks. Confidentiality is at risk as attackers may steal sensitive information accessible through the RSS Digest platform. Integrity can be compromised by unauthorized content modifications or injection of malicious payloads, potentially damaging organizational reputation or misleading users. Availability impact is generally low but could occur if attackers use the vulnerability to disrupt service or cause application errors. Given the network-exploitable nature and no requirement for privileges, attackers can target any user of the application, increasing the likelihood of successful exploitation. European organizations in sectors such as media, publishing, or any relying on RSS Digest for content aggregation and distribution are particularly vulnerable. Furthermore, compliance with GDPR and other data protection regulations could be jeopardized if personal data is exposed or manipulated due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-53331, organizations should implement the following specific measures: 1) Immediately update the samcharrington RSS Digest application to a patched version once available; since no patch links are currently provided, monitor vendor announcements closely. 2) Implement anti-CSRF tokens in all state-changing requests to ensure that requests originate from legitimate users and sessions. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of Stored XSS. 4) Sanitize and validate all user inputs rigorously to prevent injection of malicious scripts. 5) Conduct regular security audits and penetration testing focusing on CSRF and XSS vectors within the application. 6) Educate users about the risks of clicking on suspicious links or performing actions from untrusted sources, as user interaction is required for exploitation. 7) Use web application firewalls (WAFs) configured to detect and block CSRF and XSS attack patterns. 8) Monitor logs for unusual activity that may indicate exploitation attempts. These measures combined will reduce the attack surface and limit the potential damage from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T11:59:22.192Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ea034f6cf9081996a7a1a

Added to database: 6/27/2025, 1:44:20 PM

Last enriched: 6/27/2025, 1:55:49 PM

Last updated: 8/18/2025, 12:11:55 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats