Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60784: n/a

0
Medium
VulnerabilityCVE-2025-60784cvecve-2025-60784
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-60784 is a medium-severity vulnerability in the XiaozhangBang Voluntary Like System V8. 8 that allows remote attackers to manipulate the discount parameter (zhekou) in the /topfirst. php Pay module. By sending crafted HTTP POST requests with abnormally low discount values, attackers can purchase votes at reduced costs, causing economic loss. Additionally, modifying the zid parameter enables attackers to influence purchases on behalf of other users, amplifying the impact. The root cause is insufficient server-side validation of these parameters, leading to unauthorized discount manipulation and vote count tampering. Exploitation requires low privileges but no user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. This vulnerability primarily impacts the integrity of the voting system and may cause financial damage to operators. European organizations using this system or similar voting/payment modules should prioritize patching and implement strict server-side input validation to mitigate risks.

AI-Powered Analysis

AILast updated: 11/12/2025, 21:32:51 UTC

Technical Analysis

CVE-2025-60784 identifies a vulnerability in the XiaozhangBang Voluntary Like System version 8.8, specifically within the /topfirst.php Pay module. The vulnerability arises from inadequate server-side validation of two critical parameters: 'zhekou' (discount) and 'zid' (user identifier). An attacker can remotely send a crafted HTTP POST request with the 'zhekou' parameter set to an abnormally low value, thereby purchasing votes at a significantly reduced cost. This manipulation directly impacts the economic model of the voting system by allowing unauthorized discounts. Furthermore, by altering the 'zid' parameter, attackers can affect transactions on behalf of other users, potentially causing unfair vote inflation or economic loss to legitimate users. The vulnerability is classified under CWE-284 (Improper Access Control) and CWE-285 (Improper Authorization), indicating that the system fails to enforce proper authorization checks on these parameters. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of privileges can exploit the vulnerability remotely without user interaction, compromising the integrity of the system by unauthorized discount manipulation and vote tampering. No patches or known exploits are currently available, emphasizing the need for proactive mitigation. The vulnerability can lead to economic loss for operators and undermine the trustworthiness of the voting system.

Potential Impact

For European organizations utilizing the XiaozhangBang Voluntary Like System or similar voting/payment platforms, this vulnerability poses significant risks. The primary impact is economic loss due to unauthorized discounts on vote purchases, which can distort voting outcomes and damage the credibility of online voting or promotional campaigns. Organizations relying on such systems for marketing, customer engagement, or decision-making may face reputational damage if vote manipulation is detected. Additionally, the ability to influence purchases on behalf of other users raises concerns about fraud and potential legal liabilities under European consumer protection laws. The integrity of the voting data is compromised, which can affect business decisions and stakeholder trust. While availability and confidentiality are not directly impacted, the economic and reputational consequences can be severe. Given the medium severity and the requirement for some privileges, insider threats or compromised accounts could exploit this vulnerability. European entities in sectors such as e-commerce, digital marketing, and online community platforms are particularly at risk.

Mitigation Recommendations

To mitigate CVE-2025-60784, organizations should implement strict server-side validation and authorization checks for all input parameters, especially 'zhekou' and 'zid' in the /topfirst.php Pay module. Specifically: 1) Enforce whitelist validation on the 'zhekou' parameter to ensure discount values fall within acceptable, predefined ranges. 2) Authenticate and authorize the 'zid' parameter to confirm that the user initiating the transaction has permission to act on the specified user ID. 3) Implement logging and monitoring of discount-related transactions to detect anomalous patterns indicative of exploitation attempts. 4) Apply the principle of least privilege to user accounts to reduce the risk of exploitation by low-privilege attackers. 5) Conduct code reviews and penetration testing focused on input validation and access control mechanisms within the payment and voting modules. 6) If possible, deploy web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests manipulating these parameters. 7) Engage with the vendor or development team to obtain patches or updates addressing this vulnerability. 8) Educate relevant staff about the risks of parameter manipulation and encourage prompt reporting of suspicious activities. These measures go beyond generic advice by focusing on parameter-specific controls and monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690bb7fc6ab8174a0d369d6e

Added to database: 11/5/2025, 8:47:56 PM

Last enriched: 11/12/2025, 9:32:51 PM

Last updated: 12/20/2025, 5:19:10 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats