Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58676: CWE-352 Cross-Site Request Forgery (CSRF) in extendyourweb HORIZONTAL SLIDER

0
High
VulnerabilityCVE-2025-58676cvecve-2025-58676cwe-352
Published: Mon Sep 22 2025 (09/22/2025, 18:22:51 UTC)
Source: CVE Database V5
Vendor/Project: extendyourweb
Product: HORIZONTAL SLIDER

Description

Cross-Site Request Forgery (CSRF) vulnerability in extendyourweb HORIZONTAL SLIDER allows Stored XSS. This issue affects HORIZONTAL SLIDER: from n/a through 2.4.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:41:53 UTC

Technical Analysis

CVE-2025-58676 is a high-severity vulnerability affecting the extendyourweb HORIZONTAL SLIDER product, specifically versions up to 2.4. The vulnerability is classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness. CSRF vulnerabilities allow an attacker to trick authenticated users into submitting unwanted requests to a web application in which they are currently authenticated. In this case, the CSRF vulnerability enables Stored Cross-Site Scripting (Stored XSS) attacks. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database, and then executed in the browsers of users who access the affected content. The CVSS 3.1 base score of 7.1 reflects a high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but user interaction needed. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level each, indicating that the attacker could potentially steal sensitive information, manipulate data, or disrupt service to some extent. The vulnerability is exploitable remotely without authentication but requires user interaction, such as the victim clicking a crafted link or visiting a malicious website while authenticated to the vulnerable application. No patches or fixes are currently available, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects the HORIZONTAL SLIDER product, a web component likely used to create interactive horizontal sliders on websites, which may be integrated into various web platforms or content management systems. The presence of stored XSS via CSRF increases the risk because it allows persistent malicious code injection that can affect multiple users over time once exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the HORIZONTAL SLIDER component in their web applications or websites. Exploitation could lead to unauthorized actions performed on behalf of legitimate users, data theft, session hijacking, or defacement of web content. This can damage the organization's reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and cause operational disruptions. Since stored XSS can be used to deliver further attacks such as malware distribution or phishing, the threat extends beyond immediate technical impacts to broader cybersecurity risks. Organizations in sectors with high web presence, such as e-commerce, media, and public services, are particularly vulnerable. The requirement for user interaction means that social engineering or phishing campaigns could be used to trigger exploitation, increasing the attack surface. The lack of available patches necessitates immediate risk management and mitigation to prevent exploitation.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the HORIZONTAL SLIDER component from critical web applications until a patch is available. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of stored XSS. 3. Employ anti-CSRF tokens in all state-changing requests to prevent unauthorized requests from being accepted by the server. 4. Conduct thorough input validation and output encoding on all user-supplied data to prevent script injection. 5. Monitor web application logs for unusual activity or unexpected requests that may indicate exploitation attempts. 6. Educate users about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to sensitive applications. 7. Stay updated with vendor advisories and apply patches promptly once they become available. 8. Consider deploying Web Application Firewalls (WAF) with rules designed to detect and block CSRF and XSS attack patterns targeting this component. 9. Review and limit the use of third-party plugins or components, ensuring they come from trusted sources and are regularly updated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-03T09:03:46.831Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194d1a6a0abbafb7a3cec

Added to database: 9/22/2025, 6:26:25 PM

Last enriched: 9/30/2025, 1:41:53 AM

Last updated: 10/7/2025, 1:51:44 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats