Skip to main content

CVE-2025-58997: CWE-352 Cross-Site Request Forgery (CSRF) in Frenify Mow

Critical
VulnerabilityCVE-2025-58997cvecve-2025-58997cwe-352
Published: Tue Sep 09 2025 (09/09/2025, 16:33:06 UTC)
Source: CVE Database V5
Vendor/Project: Frenify
Product: Mow

Description

Cross-Site Request Forgery (CSRF) vulnerability in Frenify Mow allows Code Injection. This issue affects Mow: from n/a through 4.10.

AI-Powered Analysis

AILast updated: 09/09/2025, 16:43:33 UTC

Technical Analysis

CVE-2025-58997 is a critical Cross-Site Request Forgery (CSRF) vulnerability affecting the Frenify Mow product, up to version 4.10. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the lack of proper CSRF protections. Specifically, the flaw enables code injection, which means that an attacker can inject and execute arbitrary code within the context of the vulnerable application. The CVSS v3.1 score of 9.6 indicates a critical severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), highlighting the potential for complete system compromise. The vulnerability is categorized under CWE-352, which is the standard identifier for CSRF issues. No patches or known exploits in the wild have been reported yet, but the critical nature and potential for code injection make this a significant threat. The vulnerability was published on September 9, 2025, and assigned by Patchstack. The lack of patch links suggests that a fix may not yet be available, emphasizing the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability could be severe. Frenify Mow is presumably a web-based application or platform, and if widely used in Europe, exploitation could lead to unauthorized code execution, data breaches, and service disruptions. The critical severity and ability to change scope mean attackers could pivot within networks, compromising sensitive data and critical infrastructure. Organizations handling personal data under GDPR could face regulatory penalties if breaches occur. The requirement for user interaction means phishing or social engineering could facilitate exploitation, increasing risk in environments with less user security awareness. The vulnerability could affect sectors such as finance, healthcare, government, and e-commerce, where Frenify Mow might be deployed. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score demands immediate attention to prevent potential attacks.

Mitigation Recommendations

Given the lack of available patches, European organizations should implement immediate compensating controls. These include: 1) Enforcing strict Content Security Policies (CSP) to limit code execution capabilities; 2) Implementing anti-CSRF tokens and verifying their presence in all state-changing requests if possible; 3) Restricting user privileges and minimizing the number of users with administrative access to reduce impact; 4) Enhancing user awareness training to recognize and avoid phishing attempts that could trigger CSRF attacks; 5) Monitoring web application logs for unusual or unauthorized requests indicative of CSRF exploitation; 6) Employing Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns; 7) Segregating networks and applying the principle of least privilege to limit lateral movement if exploitation occurs; 8) Regularly reviewing and updating session management and authentication mechanisms to prevent session fixation or hijacking that could facilitate CSRF; 9) Coordinating with Frenify for timely patch deployment once available; and 10) Conducting penetration testing focused on CSRF vulnerabilities to identify and remediate weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:45:29.150Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c05927ffcb452a184a8c56

Added to database: 9/9/2025, 4:43:19 PM

Last enriched: 9/9/2025, 4:43:33 PM

Last updated: 9/9/2025, 4:44:03 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats