Skip to main content

CVE-2025-58801: CWE-352 Cross-Site Request Forgery (CSRF) in KCS Responder

Medium
VulnerabilityCVE-2025-58801cvecve-2025-58801cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 13:45:07 UTC)
Source: CVE Database V5
Vendor/Project: KCS
Product: Responder

Description

Cross-Site Request Forgery (CSRF) vulnerability in KCS Responder allows Cross Site Request Forgery. This issue affects Responder: from n/a through 4.3.8.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:20:16 UTC

Technical Analysis

CVE-2025-58801 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the KCS Responder product, affecting versions up to 4.3.8. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application in which they are currently authenticated. This can result in unauthorized actions being performed on behalf of the user without their consent. In this case, the vulnerability allows attackers to exploit the lack of proper CSRF protections in KCS Responder, potentially leading to unauthorized changes or actions that impact the integrity and availability of the system. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The vulnerability impacts integrity and availability (I:L, A:L) but not confidentiality. There are no known exploits in the wild at this time, and no patches have been linked or published yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. The lack of patches and the presence of user interaction as a requirement suggest that exploitation is possible but not trivial, and the impact is limited to unauthorized changes or disruptions rather than data disclosure.

Potential Impact

For European organizations using KCS Responder, this vulnerability poses a risk of unauthorized actions being executed through CSRF attacks, which could lead to service disruptions or integrity issues within affected systems. Since the vulnerability affects availability and integrity but not confidentiality, the primary concern is operational impact rather than data breach. Organizations in sectors with critical infrastructure or sensitive operational environments could face disruptions if attackers leverage this vulnerability to manipulate system behavior. The requirement for user interaction means that phishing or social engineering could be used to trigger the exploit, increasing risk in environments where users have access to the Responder interface. The absence of known exploits reduces immediate risk, but the medium severity score and lack of patches mean organizations should proactively address this vulnerability to prevent future exploitation. European organizations with web-facing KCS Responder deployments are particularly at risk, especially if they have users with elevated privileges or if the system is integrated into critical workflows.

Mitigation Recommendations

1. Implement strict CSRF protections such as anti-CSRF tokens or same-site cookie attributes in the KCS Responder application where possible. 2. Restrict access to the Responder interface to trusted networks and users, minimizing exposure to external threats. 3. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction-based exploitation. 4. Monitor network traffic and application logs for unusual or unauthorized requests that could indicate attempted CSRF attacks. 5. Apply principle of least privilege for user accounts interacting with KCS Responder to limit potential damage from unauthorized actions. 6. Stay alert for official patches or updates from the vendor and apply them promptly once available. 7. Consider deploying web application firewalls (WAFs) with CSRF detection capabilities to provide an additional layer of defense. 8. If feasible, disable or limit functionality that can be triggered via CSRF until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:49:01.959Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa257c5b37b67a45ff0

Added to database: 9/5/2025, 1:50:26 PM

Last enriched: 9/5/2025, 2:20:16 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats