CVE-2025-58259: CWE-352 Cross-Site Request Forgery (CSRF) in scriptsbundle Nokri
Cross-Site Request Forgery (CSRF) vulnerability in scriptsbundle Nokri allows Cross Site Request Forgery. This issue affects Nokri: from n/a through 1.6.4.
AI Analysis
Technical Summary
CVE-2025-58259 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Nokri product developed by scriptsbundle, affecting versions up to 1.6.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application without their consent or knowledge. In this case, the vulnerability allows an attacker to perform unauthorized actions on behalf of the user by exploiting the lack of proper CSRF protections in Nokri's web interface. The CVSS 3.1 base score of 7.1 (high severity) indicates that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact vector shows no confidentiality loss (C:N), but there is a low integrity impact (I:L) and a high availability impact (A:H), meaning the attacker can cause significant disruption to the availability of the service and modify data to some extent. The vulnerability does not require authentication, making it easier for attackers to exploit if they can lure users into clicking malicious links or visiting crafted web pages. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could lead to service disruption and unauthorized changes to data or settings within Nokri. Nokri is a job board or recruitment-related web application, so the vulnerability could affect organizations using this platform for recruitment or job posting purposes. The absence of published patches at this time increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using Nokri, this vulnerability poses a significant risk to the integrity and availability of their recruitment platforms. Attackers could exploit the CSRF flaw to disrupt job posting workflows, modify job listings, or cause denial of service conditions, potentially leading to operational downtime and reputational damage. Since Nokri may handle sensitive candidate and employer data, unauthorized modifications could also undermine trust and compliance with data protection regulations such as GDPR. The high availability impact could result in service outages affecting recruitment processes, which may have downstream effects on hiring timelines and business operations. Additionally, the ease of exploitation without authentication means that attackers could target employees or HR personnel through social engineering tactics, increasing the likelihood of successful attacks. Organizations relying on Nokri for critical recruitment functions should consider this vulnerability a high priority threat.
Mitigation Recommendations
Given the lack of available patches, European organizations should implement immediate compensating controls to mitigate the risk. These include: 1) Enforce strict Content Security Policy (CSP) headers to restrict the domains from which scripts and requests can be loaded, reducing the risk of malicious cross-site requests. 2) Implement or enhance anti-CSRF tokens in all state-changing requests within Nokri, if customization is possible. 3) Educate users, especially HR and recruitment staff, about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to Nokri. 4) Use web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Nokri endpoints. 5) Restrict browser sessions to same-site cookies where feasible to limit cross-site request capabilities. 6) Monitor logs for unusual or unauthorized state-changing requests and establish incident response procedures to quickly address potential exploitation. 7) Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-58259: CWE-352 Cross-Site Request Forgery (CSRF) in scriptsbundle Nokri
Description
Cross-Site Request Forgery (CSRF) vulnerability in scriptsbundle Nokri allows Cross Site Request Forgery. This issue affects Nokri: from n/a through 1.6.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-58259 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Nokri product developed by scriptsbundle, affecting versions up to 1.6.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application without their consent or knowledge. In this case, the vulnerability allows an attacker to perform unauthorized actions on behalf of the user by exploiting the lack of proper CSRF protections in Nokri's web interface. The CVSS 3.1 base score of 7.1 (high severity) indicates that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact vector shows no confidentiality loss (C:N), but there is a low integrity impact (I:L) and a high availability impact (A:H), meaning the attacker can cause significant disruption to the availability of the service and modify data to some extent. The vulnerability does not require authentication, making it easier for attackers to exploit if they can lure users into clicking malicious links or visiting crafted web pages. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could lead to service disruption and unauthorized changes to data or settings within Nokri. Nokri is a job board or recruitment-related web application, so the vulnerability could affect organizations using this platform for recruitment or job posting purposes. The absence of published patches at this time increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using Nokri, this vulnerability poses a significant risk to the integrity and availability of their recruitment platforms. Attackers could exploit the CSRF flaw to disrupt job posting workflows, modify job listings, or cause denial of service conditions, potentially leading to operational downtime and reputational damage. Since Nokri may handle sensitive candidate and employer data, unauthorized modifications could also undermine trust and compliance with data protection regulations such as GDPR. The high availability impact could result in service outages affecting recruitment processes, which may have downstream effects on hiring timelines and business operations. Additionally, the ease of exploitation without authentication means that attackers could target employees or HR personnel through social engineering tactics, increasing the likelihood of successful attacks. Organizations relying on Nokri for critical recruitment functions should consider this vulnerability a high priority threat.
Mitigation Recommendations
Given the lack of available patches, European organizations should implement immediate compensating controls to mitigate the risk. These include: 1) Enforce strict Content Security Policy (CSP) headers to restrict the domains from which scripts and requests can be loaded, reducing the risk of malicious cross-site requests. 2) Implement or enhance anti-CSRF tokens in all state-changing requests within Nokri, if customization is possible. 3) Educate users, especially HR and recruitment staff, about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to Nokri. 4) Use web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Nokri endpoints. 5) Restrict browser sessions to same-site cookies where feasible to limit cross-site request capabilities. 6) Monitor logs for unusual or unauthorized state-changing requests and establish incident response procedures to quickly address potential exploitation. 7) Engage with the vendor or community to track patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-08-27T16:19:53.147Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194cfa6a0abbafb7a3c0a
Added to database: 9/22/2025, 6:26:23 PM
Last enriched: 9/30/2025, 1:01:37 AM
Last updated: 10/7/2025, 1:33:42 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.