CVE-2025-58690: CWE-352 Cross-Site Request Forgery (CSRF) in ptibogxiv Doliconnect
Cross-Site Request Forgery (CSRF) vulnerability in ptibogxiv Doliconnect allows Stored XSS. This issue affects Doliconnect: from n/a through 9.5.7.
AI Analysis
Technical Summary
CVE-2025-58690 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ptibogxiv Doliconnect product, affecting versions up to 9.5.7. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unauthorized requests to a web application in which they are currently authenticated. This particular vulnerability also enables Stored Cross-Site Scripting (XSS), meaning that malicious scripts can be permanently stored on the target server and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 indicates a high severity level, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability, albeit at a low level for confidentiality and integrity, and low for availability. The vulnerability arises due to the lack of proper anti-CSRF tokens or validation mechanisms in Doliconnect, allowing attackers to craft malicious requests that, when executed by an authenticated user, can lead to stored XSS payloads. Stored XSS can be leveraged to steal session cookies, perform actions on behalf of users, or pivot to further attacks within the affected environment. Although no known exploits are currently reported in the wild, the presence of stored XSS combined with CSRF significantly raises the risk profile. The absence of available patches at the time of publication suggests that organizations must implement interim mitigations to reduce exposure. Doliconnect is a product used for connectivity or integration purposes, and its compromise could lead to unauthorized actions and data exposure within connected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Doliconnect for critical integration or connectivity functions. The CSRF combined with stored XSS can lead to unauthorized actions executed with the privileges of legitimate users, potentially resulting in data leakage, unauthorized configuration changes, or service disruptions. Confidentiality could be compromised through session hijacking or data exfiltration, integrity could be impacted by unauthorized modifications, and availability could be degraded by malicious payloads or denial-of-service conditions triggered via the vulnerability. Given the interconnected nature of enterprise systems in Europe, exploitation could cascade, affecting multiple systems and services. Organizations handling sensitive personal data under GDPR must be particularly cautious, as exploitation could lead to regulatory violations and significant reputational damage. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that attackers could develop effective exploits rapidly.
Mitigation Recommendations
1. Immediate implementation of strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS payloads by restricting script execution sources. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF and XSS attack patterns targeting Doliconnect endpoints. 3. Enforce multi-factor authentication (MFA) to reduce the risk of session hijacking and unauthorized actions even if CSRF is exploited. 4. Conduct thorough code and configuration reviews to identify and implement anti-CSRF tokens or same-site cookie attributes as soon as patches become available. 5. Educate users about phishing and social engineering risks to minimize the likelihood of user interaction triggering the exploit. 6. Monitor logs and network traffic for unusual POST requests or repeated failed attempts that could indicate exploitation attempts. 7. Isolate Doliconnect instances in segmented network zones with limited access to critical systems to contain potential breaches. 8. Prepare incident response plans specifically addressing CSRF and XSS attack scenarios to enable rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-58690: CWE-352 Cross-Site Request Forgery (CSRF) in ptibogxiv Doliconnect
Description
Cross-Site Request Forgery (CSRF) vulnerability in ptibogxiv Doliconnect allows Stored XSS. This issue affects Doliconnect: from n/a through 9.5.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-58690 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ptibogxiv Doliconnect product, affecting versions up to 9.5.7. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unauthorized requests to a web application in which they are currently authenticated. This particular vulnerability also enables Stored Cross-Site Scripting (XSS), meaning that malicious scripts can be permanently stored on the target server and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 indicates a high severity level, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability, albeit at a low level for confidentiality and integrity, and low for availability. The vulnerability arises due to the lack of proper anti-CSRF tokens or validation mechanisms in Doliconnect, allowing attackers to craft malicious requests that, when executed by an authenticated user, can lead to stored XSS payloads. Stored XSS can be leveraged to steal session cookies, perform actions on behalf of users, or pivot to further attacks within the affected environment. Although no known exploits are currently reported in the wild, the presence of stored XSS combined with CSRF significantly raises the risk profile. The absence of available patches at the time of publication suggests that organizations must implement interim mitigations to reduce exposure. Doliconnect is a product used for connectivity or integration purposes, and its compromise could lead to unauthorized actions and data exposure within connected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Doliconnect for critical integration or connectivity functions. The CSRF combined with stored XSS can lead to unauthorized actions executed with the privileges of legitimate users, potentially resulting in data leakage, unauthorized configuration changes, or service disruptions. Confidentiality could be compromised through session hijacking or data exfiltration, integrity could be impacted by unauthorized modifications, and availability could be degraded by malicious payloads or denial-of-service conditions triggered via the vulnerability. Given the interconnected nature of enterprise systems in Europe, exploitation could cascade, affecting multiple systems and services. Organizations handling sensitive personal data under GDPR must be particularly cautious, as exploitation could lead to regulatory violations and significant reputational damage. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that attackers could develop effective exploits rapidly.
Mitigation Recommendations
1. Immediate implementation of strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS payloads by restricting script execution sources. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF and XSS attack patterns targeting Doliconnect endpoints. 3. Enforce multi-factor authentication (MFA) to reduce the risk of session hijacking and unauthorized actions even if CSRF is exploited. 4. Conduct thorough code and configuration reviews to identify and implement anti-CSRF tokens or same-site cookie attributes as soon as patches become available. 5. Educate users about phishing and social engineering risks to minimize the likelihood of user interaction triggering the exploit. 6. Monitor logs and network traffic for unusual POST requests or repeated failed attempts that could indicate exploitation attempts. 7. Isolate Doliconnect instances in segmented network zones with limited access to critical systems to contain potential breaches. 8. Prepare incident response plans specifically addressing CSRF and XSS attack scenarios to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-03T09:03:53.070Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194d2a6a0abbafb7a3d23
Added to database: 9/22/2025, 6:26:26 PM
Last enriched: 9/30/2025, 1:35:30 AM
Last updated: 10/7/2025, 1:51:52 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.