Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59891: CWE-352 Cross-Site Request Forgery (CSRF) in Flexense Sync Breeze Enterprise Server

0
High
VulnerabilityCVE-2025-59891cvecve-2025-59891cwe-352
Published: Wed Jan 28 2026 (01/28/2026, 11:52:15 UTC)
Source: CVE Database V5
Vendor/Project: Flexense
Product: Sync Breeze Enterprise Server

Description

Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request to change a user's password or create users via '/setup_login?sid=', affecting the 'username', 'password', and 'cpassword' parameters.

AI-Powered Analysis

AILast updated: 01/28/2026, 12:21:07 UTC

Technical Analysis

CVE-2025-59891 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Flexense's Sync Breeze Enterprise Server and Disk Pulse Enterprise, specifically version 10.4.18. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their consent, exploiting the user's active session. In this case, the vulnerability stems from the lack of proper CSRF token implementation, which is a standard defense mechanism to validate the legitimacy of requests. The affected endpoints include '/setup_login?sid=', which accepts POST requests with parameters such as 'username', 'password', and 'cpassword'. An attacker with authenticated access can craft malicious requests that cause another user to unknowingly change their password or create new user accounts, potentially leading to unauthorized access or privilege escalation within the application. The vulnerability does not require the attacker to have elevated privileges beyond authenticated user status, and no user interaction beyond the victim being logged in is necessary. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack is network-based, requires low attack complexity, no additional privileges beyond authentication, and user interaction (victim logged in), with high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the sensitive nature of account management functions it affects. The absence of published patches at the time of disclosure necessitates immediate attention to mitigate potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-59891 can be substantial. Sync Breeze Enterprise Server and Disk Pulse Enterprise are used for file synchronization and disk change monitoring, often in environments requiring strict data integrity and access control. Exploitation could allow attackers to change user passwords or create unauthorized accounts, leading to unauthorized access, data breaches, or disruption of file synchronization services. This could compromise sensitive corporate data, disrupt business continuity, and potentially facilitate lateral movement within networks. Given the high CVSS score and the critical nature of user account management, organizations could face confidentiality breaches, integrity violations, and availability issues. The risk is heightened in sectors with stringent regulatory requirements such as finance, healthcare, and critical infrastructure, common across Europe. Additionally, the ease of exploitation over the network and the lack of need for elevated privileges increase the threat level. Organizations relying on these products without proper mitigations may be vulnerable to targeted attacks or insider threats leveraging this flaw.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the Sync Breeze Enterprise Server and Disk Pulse Enterprise management interfaces to trusted networks and IP addresses, minimizing exposure to potential attackers. 2. Implement web application firewalls (WAFs) with rules designed to detect and block suspicious POST requests to the affected endpoints, especially those attempting to modify user credentials or create accounts. 3. Enforce multi-factor authentication (MFA) for all users accessing the affected applications to reduce the risk of account compromise even if CSRF attacks succeed. 4. Monitor logs for unusual activities such as unexpected password changes or new user creations, and establish alerting mechanisms for such events. 5. Until an official patch is released, consider disabling or restricting the vulnerable endpoints if feasible, or applying custom CSRF token validation via reverse proxies or application-layer controls. 6. Educate users about the risks of CSRF and encourage best practices such as logging out after sessions and avoiding untrusted websites while logged in. 7. Plan for rapid deployment of vendor patches once available and verify their effectiveness through security testing. 8. Conduct regular security assessments and penetration tests focusing on web application vulnerabilities including CSRF to proactively identify and remediate similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-09-23T10:22:34.912Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6979fba54623b1157cb5f7c8

Added to database: 1/28/2026, 12:05:57 PM

Last enriched: 1/28/2026, 12:21:07 PM

Last updated: 2/5/2026, 5:50:00 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats