Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60093: CWE-352 Cross-Site Request Forgery (CSRF) in Shahjada Download Manager

0
Medium
VulnerabilityCVE-2025-60093cvecve-2025-60093cwe-352
Published: Fri Sep 26 2025 (09/26/2025, 08:31:17 UTC)
Source: CVE Database V5
Vendor/Project: Shahjada
Product: Download Manager

Description

Cross-Site Request Forgery (CSRF) vulnerability in Shahjada Download Manager allows Cross Site Request Forgery. This issue affects Download Manager: from n/a through 3.3.24.

AI-Powered Analysis

AILast updated: 10/04/2025, 00:35:30 UTC

Technical Analysis

CVE-2025-60093 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Shahjada Download Manager product, affecting versions up to 3.3.24. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a request to a web application without their consent or knowledge. This can lead to unauthorized actions being performed on behalf of the user. Specifically, this vulnerability does not impact confidentiality or availability but can affect the integrity of the system by enabling unauthorized state-changing operations. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The attack complexity is low (AC:L), and the scope is unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Since the Shahjada Download Manager is a web-based tool for managing downloads, exploitation could allow attackers to manipulate download settings or trigger unintended downloads if a user visits a malicious site while authenticated. This could lead to integrity issues such as unauthorized configuration changes or triggering unwanted actions within the application.

Potential Impact

For European organizations using Shahjada Download Manager, this vulnerability poses a risk primarily to the integrity of their download management processes. While it does not directly compromise sensitive data confidentiality or system availability, unauthorized changes could disrupt workflows or introduce malicious downloads if exploited. Organizations with web-facing instances of this software are at greater risk, especially if users with administrative privileges are targeted. The requirement for user interaction means phishing or social engineering could be used to induce the victim to perform the malicious action. In sectors such as government, finance, or critical infrastructure within Europe, even integrity compromises can have cascading effects on operational security and trust. Additionally, organizations with strict compliance requirements around change control and auditability may find this vulnerability problematic. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

To mitigate this CSRF vulnerability, European organizations should implement the following specific measures: 1) Apply any available patches or updates from Shahjada as soon as they are released. 2) If patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting the Download Manager. 3) Enforce the use of anti-CSRF tokens in all state-changing requests within the application if customization or configuration options exist. 4) Educate users about the risks of phishing and the importance of not clicking on suspicious links while authenticated to the Download Manager. 5) Restrict access to the Download Manager interface to trusted networks or VPNs to reduce exposure. 6) Monitor logs for unusual or unauthorized actions that could indicate exploitation attempts. 7) Consider implementing multi-factor authentication (MFA) to reduce the risk of session hijacking that could facilitate CSRF attacks. These steps go beyond generic advice by focusing on compensating controls and user awareness until an official patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:09.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d72b6379aa5c9d0854f4f9

Added to database: 9/27/2025, 12:10:11 AM

Last enriched: 10/4/2025, 12:35:30 AM

Last updated: 10/7/2025, 1:52:49 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats