Skip to main content

CVE-2025-54673: CWE-352 Cross-Site Request Forgery (CSRF) in Ays Pro Chartify

Medium
VulnerabilityCVE-2025-54673cvecve-2025-54673cwe-352
Published: Thu Aug 14 2025 (08/14/2025, 10:34:40 UTC)
Source: CVE Database V5
Vendor/Project: Ays Pro
Product: Chartify

Description

Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Chartify allows Cross Site Request Forgery. This issue affects Chartify: from n/a through 3.5.3.

AI-Powered Analysis

AILast updated: 08/14/2025, 11:21:40 UTC

Technical Analysis

CVE-2025-54673 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Ays Pro Chartify product, affecting versions up to 3.5.3. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows attackers to exploit the trust that Chartify places in the user's browser, potentially leading to unauthorized state-changing operations. The CVSS 3.1 base score of 4.3 indicates a medium severity level, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Since Chartify is a charting and data visualization tool, the potential impact involves unauthorized modification of user data or settings within the application, which could lead to data integrity issues or manipulation of visualized data. However, the lack of confidentiality or availability impact reduces the overall risk severity. The vulnerability affects web clients interacting with Chartify, and exploitation requires the victim to be authenticated and to interact with a maliciously crafted web page or link.

Potential Impact

For European organizations using Ays Pro Chartify, this vulnerability could lead to unauthorized changes in data visualizations or configurations, potentially misleading decision-making processes or corrupting reports. While the confidentiality of data is not directly compromised, the integrity of visualized data could be affected, which is critical for sectors relying heavily on accurate data representation such as finance, healthcare, and government agencies. The requirement for user interaction and authentication limits the ease of exploitation but does not eliminate risk, especially in environments where users frequently access external web content. The absence of known exploits reduces immediate threat levels, but organizations should remain vigilant. The impact on availability is negligible, so operational continuity is unlikely to be affected. Overall, the threat could undermine trust in data accuracy and lead to erroneous business or operational decisions if exploited.

Mitigation Recommendations

Organizations should implement strict anti-CSRF protections in their deployment of Chartify, such as enforcing CSRF tokens on all state-changing requests and validating the origin and referer headers. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts. User education is important to reduce the risk of interaction with malicious links or sites. Since no official patches are currently available, organizations should monitor vendor communications for updates and apply patches promptly once released. Additionally, limiting user privileges within Chartify to the minimum necessary can reduce the impact of any successful CSRF attack. Network segmentation and restricting access to Chartify interfaces to trusted networks can further reduce exposure. Regular security assessments and penetration testing focusing on CSRF and related web vulnerabilities are recommended to ensure ongoing protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:55:38.572Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee5ad5a09ad0059e68c

Added to database: 8/14/2025, 10:48:05 AM

Last enriched: 8/14/2025, 11:21:40 AM

Last updated: 8/14/2025, 11:21:40 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats