Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60912: n/a

0
Low
VulnerabilityCVE-2025-60912cvecve-2025-60912
Published: Mon Dec 08 2025 (12/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

phpIPAM v1.7.3 contains a Cross-Site Request Forgery (CSRF) vulnerability in the database export functionality. The generate-mysql.php function, located in the /app/admin/import-export/ endpoint, allows remote attackers to trigger large database dump downloads via crafted HTTP GET requests if an administrator has an active session.

AI-Powered Analysis

AILast updated: 12/08/2025, 15:31:39 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60912 affects phpIPAM version 1.7.3, an open-source IP address management application widely used for network administration. The flaw is a Cross-Site Request Forgery (CSRF) vulnerability located in the generate-mysql.php function within the /app/admin/import-export/ endpoint. This function facilitates database exports, allowing administrators to download database dumps. Due to insufficient CSRF protections, an attacker can craft a malicious HTTP GET request that, when executed by an authenticated administrator, triggers an unauthorized database export. The attack vector requires that the administrator has an active session and visits a malicious URL, which can be delivered via phishing emails or malicious websites. The vulnerability does not require privilege escalation or bypass of authentication but leverages the trust of the administrator's browser session. The lack of a CVSS score indicates the vulnerability is newly published with limited public information and no known exploits in the wild. The absence of patch links suggests that a fix is not yet publicly available, increasing the urgency for organizations to implement compensating controls. The primary risk is unauthorized disclosure of sensitive network information stored in the phpIPAM database, which could be leveraged for further attacks or espionage.

Potential Impact

For European organizations, the impact of this vulnerability is primarily the risk of unauthorized disclosure of sensitive network infrastructure data. This data may include IP address allocations, device inventories, and network topology details critical for operational security. Exposure of such information can facilitate targeted attacks, including lateral movement, network reconnaissance, and exploitation of other vulnerabilities. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that rely on phpIPAM for IP address management are particularly vulnerable. The attack requires an active administrator session, so organizations with lax session management or insufficient user awareness are at higher risk. The potential for large database dumps means significant data leakage could occur in a single exploit. Although no known exploits exist in the wild, the vulnerability's publication may prompt attackers to develop exploits, increasing the threat over time.

Mitigation Recommendations

1. Implement robust CSRF protections on all state-changing endpoints, especially the database export functionality. This includes using anti-CSRF tokens validated on the server side. 2. Restrict access to the /app/admin/import-export/ endpoint to trusted IP addresses or VPNs to limit exposure. 3. Enforce strict session management policies, including short session timeouts and re-authentication for sensitive actions like database exports. 4. Educate administrators about phishing and social engineering risks to reduce the likelihood of visiting malicious links. 5. Monitor logs for unusual export activity or large data downloads from the phpIPAM application. 6. If possible, upgrade to a patched version once available or apply vendor-provided mitigations. 7. Consider network segmentation to isolate management interfaces from general user access. 8. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable endpoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6936ebea04c1ddb1a4e20861

Added to database: 12/8/2025, 3:16:58 PM

Last enriched: 12/8/2025, 3:31:39 PM

Last updated: 12/10/2025, 8:00:54 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats