Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54702: CWE-352 Cross-Site Request Forgery (CSRF) in motov.net Ebook Store

0
Medium
VulnerabilityCVE-2025-54702cvecve-2025-54702cwe-352
Published: Thu Aug 14 2025 (08/14/2025, 10:34:56 UTC)
Source: CVE Database V5
Vendor/Project: motov.net
Product: Ebook Store

Description

Cross-Site Request Forgery (CSRF) vulnerability in motov.net Ebook Store allows Cross Site Request Forgery. This issue affects Ebook Store: from n/a through 5.8013.

AI-Powered Analysis

AILast updated: 08/14/2025, 11:07:20 UTC

Technical Analysis

CVE-2025-54702 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the motov.net Ebook Store application, affecting versions up to 5.8013. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their consent or knowledge. In this case, the vulnerability allows an attacker to induce a victim to perform unintended actions on the Ebook Store platform by exploiting the victim's active session. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reveals that the attack can be executed remotely over the network without any privileges, requires low attack complexity, no privileges, but does require user interaction (the victim must be tricked into clicking a malicious link or visiting a crafted webpage). The impact is limited to integrity, meaning the attacker can cause unauthorized changes or actions within the application, but confidentiality and availability are not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to insufficient request validation to prevent CSRF attacks. Given the nature of the Ebook Store application, potential unauthorized actions could include modifying user settings, changing purchase details, or manipulating account-related functions if those actions are not properly protected against CSRF.

Potential Impact

For European organizations using the motov.net Ebook Store platform, this vulnerability could lead to unauthorized actions performed on behalf of legitimate users, potentially resulting in fraudulent transactions, unauthorized changes to user accounts, or manipulation of digital content delivery. While the confidentiality of user data is not directly impacted, the integrity compromise could undermine user trust and lead to financial or reputational damage. Organizations in sectors such as education, publishing, and digital content distribution that rely on this platform may face operational disruptions or customer dissatisfaction. Additionally, regulatory compliance under GDPR requires organizations to maintain integrity and security of personal data, so exploitation of this vulnerability could raise compliance concerns if it leads to unauthorized data manipulation.

Mitigation Recommendations

To mitigate this CSRF vulnerability effectively, organizations should implement anti-CSRF tokens (synchronizer tokens) in all state-changing requests within the Ebook Store application. These tokens should be unique per user session and validated server-side to ensure requests are legitimate. Additionally, enforcing the SameSite attribute on cookies (preferably SameSite=Strict or Lax) can reduce the risk of CSRF by restricting cross-origin requests. Organizations should also ensure that sensitive actions require re-authentication or multi-factor authentication to add an extra layer of protection. Monitoring and logging unusual user activity can help detect potential exploitation attempts. Since no official patch is currently available, organizations should consider applying web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns. Finally, educating users about the risks of clicking untrusted links and encouraging safe browsing habits can reduce the likelihood of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:56:09.193Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee7ad5a09ad0059e6fb

Added to database: 8/14/2025, 10:48:07 AM

Last enriched: 8/14/2025, 11:07:20 AM

Last updated: 10/16/2025, 8:11:50 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats