Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58200: CWE-352 Cross-Site Request Forgery (CSRF) in Bage Flexible FAQ

0
Medium
VulnerabilityCVE-2025-58200cvecve-2025-58200cwe-352
Published: Mon Sep 22 2025 (09/22/2025, 18:23:50 UTC)
Source: CVE Database V5
Vendor/Project: Bage
Product: Flexible FAQ

Description

Cross-Site Request Forgery (CSRF) vulnerability in Bage Flexible FAQ allows Cross Site Request Forgery. This issue affects Flexible FAQ: from n/a through 0.2.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:21:40 UTC

Technical Analysis

CVE-2025-58200 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Bage Flexible FAQ product, affecting versions up to 0.2. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a malicious request to a web application in which the user is currently authenticated. This can result in unauthorized actions being performed on behalf of the user without their consent. In this case, the vulnerability affects Flexible FAQ, a web-based FAQ management tool developed by Bage. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network without privileges and requires user interaction (such as clicking a crafted link). The impact is limited to integrity loss, with no confidentiality or availability impact. The vulnerability does not require authentication, meaning even unauthenticated attackers can exploit it if they can lure a user into interacting with a malicious link or webpage. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. This vulnerability typically arises when web applications fail to implement anti-CSRF tokens or other protective mechanisms to validate the legitimacy of state-changing requests.

Potential Impact

For European organizations using Bage Flexible FAQ, this vulnerability could allow attackers to perform unauthorized modifications to FAQ content or configurations by exploiting authenticated users. While the impact does not extend to data confidentiality or availability, integrity loss could lead to misinformation, defacement, or manipulation of FAQ content, potentially damaging organizational reputation and user trust. In sectors where accurate information dissemination is critical, such as government, healthcare, or finance, this could have secondary impacts on operational effectiveness or compliance. Since the attack requires user interaction but no authentication, phishing or social engineering campaigns could be used to exploit this vulnerability. The medium severity rating suggests a moderate risk, but organizations should consider the context of their deployment and the sensitivity of the information managed by the Flexible FAQ system.

Mitigation Recommendations

1. Implement anti-CSRF tokens: Ensure that all state-changing requests in the Flexible FAQ application include unique, unpredictable tokens that are validated server-side to confirm request legitimacy. 2. Use SameSite cookies: Configure session cookies with the 'SameSite' attribute set to 'Strict' or 'Lax' to reduce the risk of cross-origin requests being accepted. 3. Require user re-authentication or confirmation for sensitive actions: Adding an additional confirmation step can prevent automated or unintended requests. 4. Monitor and restrict referrer headers: Validate the origin or referrer of requests to ensure they come from trusted sources. 5. Educate users: Train users to recognize phishing attempts and avoid clicking suspicious links. 6. Keep Flexible FAQ updated: Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 7. Employ Web Application Firewalls (WAFs): Configure WAFs to detect and block CSRF attack patterns targeting Flexible FAQ endpoints. 8. Conduct regular security assessments: Perform penetration testing and code reviews focusing on CSRF and other web vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-27T16:18:58.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194cca6a0abbafb7a3b42

Added to database: 9/22/2025, 6:26:20 PM

Last enriched: 9/30/2025, 1:21:40 AM

Last updated: 10/7/2025, 1:40:06 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats