Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59137: CWE-352 Cross-Site Request Forgery (CSRF) in eLEOPARD Behance Portfolio Manager

0
High
VulnerabilityCVE-2025-59137cvecve-2025-59137cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 04:33:22 UTC)
Source: CVE Database V5
Vendor/Project: eLEOPARD
Product: Behance Portfolio Manager

Description

Cross-Site Request Forgery (CSRF) vulnerability in eLEOPARD Behance Portfolio Manager allows Stored XSS.This issue affects Behance Portfolio Manager: from n/a through 1.7.5.

AI-Powered Analysis

AILast updated: 12/31/2025, 18:13:53 UTC

Technical Analysis

CVE-2025-59137 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the eLEOPARD Behance Portfolio Manager software, affecting versions up to 1.7.5. The vulnerability arises because the application fails to adequately verify the authenticity of requests made by users, allowing attackers to trick authenticated users into submitting malicious requests unknowingly. This CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist within the application and execute in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and the scope is changed (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes partial loss of confidentiality, integrity, and availability, as attackers can manipulate user data and execute scripts that may steal session tokens or perform unauthorized actions. The vulnerability was reserved in September 2025 and published in December 2025, with no patches or known exploits currently available. The CWE-352 classification confirms the nature of the CSRF weakness. Given the stored XSS consequence, the vulnerability poses a significant risk for persistent client-side attacks, potentially leading to broader compromise within affected environments.

Potential Impact

For European organizations, the impact of CVE-2025-59137 can be substantial, particularly for those relying on eLEOPARD Behance Portfolio Manager for managing creative portfolios and digital assets. The stored XSS resulting from the CSRF attack can lead to session hijacking, credential theft, unauthorized data manipulation, and potential lateral movement within networks. Confidentiality is at risk as attackers may exfiltrate sensitive user information or intellectual property. Integrity is compromised through unauthorized changes to portfolio content or user settings. Availability may be affected if attackers disrupt service or cause application instability. Organizations in creative industries, marketing agencies, and digital content providers are especially vulnerable due to the nature of the software. The lack of available patches increases exposure time, necessitating immediate mitigation. Additionally, the cross-site nature of the attack means that users interacting with the application from European IP addresses could be targeted, amplifying the threat landscape within the region.

Mitigation Recommendations

To mitigate CVE-2025-59137 effectively, organizations should implement the following specific measures: 1) Deploy web application firewalls (WAFs) configured to detect and block CSRF attack patterns and suspicious POST requests lacking valid CSRF tokens. 2) Enforce strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and reduce the impact of stored XSS payloads. 3) Conduct thorough code reviews and apply manual or automated CSRF token implementation in all state-changing requests within the application. 4) Educate users to recognize phishing attempts that may trigger CSRF attacks and encourage the use of updated browsers with anti-CSRF protections. 5) Monitor application logs for unusual request patterns or repeated failed CSRF token validations. 6) Segment network access to the portfolio manager to restrict exposure to trusted users and IP ranges. 7) Prepare incident response plans specifically addressing XSS and CSRF attack scenarios. 8) Engage with the vendor eLEOPARD to obtain patches or updates as soon as they become available and plan for timely deployment. These steps go beyond generic advice by focusing on layered defenses and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-09T14:47:17.697Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69556460db813ff03ef78085

Added to database: 12/31/2025, 5:58:56 PM

Last enriched: 12/31/2025, 6:13:53 PM

Last updated: 1/8/2026, 7:21:30 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats