Skip to main content

CVE-2025-58865: CWE-352 Cross-Site Request Forgery (CSRF) in reimund Compact Admin

Medium
VulnerabilityCVE-2025-58865cvecve-2025-58865cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 13:45:42 UTC)
Source: CVE Database V5
Vendor/Project: reimund
Product: Compact Admin

Description

Cross-Site Request Forgery (CSRF) vulnerability in reimund Compact Admin allows Cross Site Request Forgery. This issue affects Compact Admin: from n/a through 1.3.0.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:07:36 UTC

Technical Analysis

CVE-2025-58865 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the reimund Compact Admin product, affecting versions up to 1.3.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request to a web application, thereby performing unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to exploit the lack of proper anti-CSRF protections in Compact Admin, potentially causing the victim's browser to execute state-changing requests such as modifying settings or performing administrative actions. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (remote), requires no privileges, but does require user interaction (e.g., clicking a malicious link or visiting a crafted webpage). The impact is limited to integrity, with no confidentiality or availability impact reported. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is classified under CWE-352, which is a common web application security weakness related to insufficient request validation mechanisms to prevent CSRF attacks.

Potential Impact

For European organizations using reimund Compact Admin, this vulnerability could allow attackers to perform unauthorized actions within the administrative interface by leveraging authenticated sessions of legitimate users. While the confidentiality and availability of systems are not directly affected, the integrity of administrative configurations or data could be compromised. This could lead to unauthorized changes in system settings, user permissions, or other administrative functions, potentially weakening security posture or causing operational disruptions. Organizations in sectors with high regulatory requirements (e.g., finance, healthcare, government) may face compliance risks if unauthorized changes go undetected. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted phishing or social engineering attacks. Since no patches are currently available, organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

1. Implement strict anti-CSRF tokens in all state-changing requests within Compact Admin to ensure that requests originate from legitimate users. 2. Enforce SameSite cookie attributes (preferably 'Strict' or 'Lax') to reduce the risk of CSRF via cross-site requests. 3. Restrict administrative interface access by IP whitelisting or VPN-only access to limit exposure. 4. Educate users and administrators about phishing and social engineering risks to reduce the chance of inadvertent interaction with malicious content. 5. Monitor logs for unusual administrative actions that could indicate exploitation attempts. 6. If possible, disable or limit the use of Compact Admin until a patch is released. 7. Follow vendor communications closely for patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:06.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa657c5b37b67a46172

Added to database: 9/5/2025, 1:50:30 PM

Last enriched: 9/5/2025, 2:07:36 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats