Skip to main content

CVE-2025-57970: CWE-352 Cross-Site Request Forgery (CSRF) in SALESmanago SALESmanago & Leadoo

Medium
VulnerabilityCVE-2025-57970cvecve-2025-57970cwe-352
Published: Mon Sep 22 2025 (09/22/2025, 18:24:37 UTC)
Source: CVE Database V5
Vendor/Project: SALESmanago
Product: SALESmanago & Leadoo

Description

Cross-Site Request Forgery (CSRF) vulnerability in SALESmanago SALESmanago & Leadoo allows Cross Site Request Forgery.This issue affects SALESmanago & Leadoo: from n/a through 3.8.1.

AI-Powered Analysis

AILast updated: 10/04/2025, 03:34:24 UTC

Technical Analysis

CVE-2025-57970 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SALESmanago & Leadoo platforms, which are marketing automation and customer engagement tools. This vulnerability affects versions up to 3.8.1, allowing an attacker to trick an authenticated user into submitting unwanted requests to the application without their consent. The vulnerability arises because the affected software does not adequately verify the origin or intent of state-changing requests, enabling attackers to craft malicious web pages or links that, when visited by a logged-in user, execute unauthorized actions on their behalf. The CVSS 3.1 base score of 4.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). This means the attacker does not need prior access or elevated privileges but does require the victim to interact with a malicious link or page. The integrity impact suggests that unauthorized modifications to data or settings could occur, potentially leading to manipulation of marketing campaigns, customer data, or system configurations. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that remediation may still be pending or in progress. The vulnerability is classified under CWE-352, a common web application security flaw related to insufficient request validation against CSRF attacks.

Potential Impact

For European organizations using SALESmanago & Leadoo, this vulnerability poses a risk primarily to the integrity of their marketing and customer engagement data. Attackers exploiting this flaw could manipulate campaign settings, alter customer segmentation, or inject fraudulent data, potentially leading to reputational damage, loss of customer trust, and financial impacts due to misdirected marketing efforts. Since these platforms often integrate with customer relationship management (CRM) systems and handle sensitive customer information, unauthorized changes could indirectly affect data accuracy and compliance with data protection regulations such as GDPR. Although confidentiality and availability are not directly impacted, the integrity compromise could result in erroneous business decisions or regulatory scrutiny. The requirement for user interaction means phishing or social engineering campaigns could be used to lure employees or administrators into triggering the exploit. Given the widespread adoption of marketing automation tools across European enterprises, especially in sectors like retail, finance, and telecommunications, the threat could have broad implications if not mitigated promptly.

Mitigation Recommendations

Organizations should implement several targeted measures beyond generic CSRF protections. First, verify whether the vendor has released patches or updates addressing this vulnerability and apply them immediately. If patches are unavailable, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting known vulnerable endpoints. Enforce strict Content Security Policies (CSP) and SameSite cookie attributes to reduce the risk of cross-origin request forgery. Educate users, especially marketing and IT staff, about phishing risks and the importance of not clicking on suspicious links while authenticated to the platform. Additionally, review and tighten user permissions within SALESmanago & Leadoo to limit the potential impact of unauthorized actions. Implement multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF exploitation. Regularly audit logs for unusual activity patterns indicating potential exploitation attempts. Finally, consider isolating critical marketing systems from general internet access where feasible, using VPNs or zero-trust network principles to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-22T11:37:02.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0920311971642e85b877b

Added to database: 10/4/2025, 3:18:27 AM

Last enriched: 10/4/2025, 3:34:24 AM

Last updated: 10/4/2025, 3:34:24 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats