CVE-2025-62101: CWE-352 Cross-Site Request Forgery (CSRF) in Omid Shamloo Pardakht Delkhah
Cross-Site Request Forgery (CSRF) vulnerability in Omid Shamloo Pardakht Delkhah allows Cross Site Request Forgery.This issue affects Pardakht Delkhah: from n/a through 3.0.0.
AI Analysis
Technical Summary
CVE-2025-62101 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Pardakht Delkhah product developed by Omid Shamloo. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the application to perform unintended actions on behalf of the user. This specific vulnerability affects all versions up to 3.0.0 of Pardakht Delkhah. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires no privileges, but does require user interaction. The impact is limited to integrity, meaning attackers can cause unauthorized changes but cannot access confidential data or disrupt availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed proactively. The lack of authentication requirements and the low complexity make this a viable attack vector, especially in environments where users are frequently authenticated and interact with the application. The vulnerability is classified under CWE-352, which is a common web security weakness related to insufficient request validation against CSRF attacks.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the potential unauthorized modification of data or application state within Pardakht Delkhah. Since Pardakht Delkhah is likely used in payment or financial processing contexts, unauthorized actions could lead to fraudulent transactions, manipulation of payment details, or unauthorized changes to user accounts. Although confidentiality and availability are not directly affected, integrity breaches can undermine trust and lead to financial losses or regulatory non-compliance, especially under GDPR and other European data protection laws. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. Organizations with high volumes of online transactions or those relying on Pardakht Delkhah for critical payment workflows are at greater risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-62101, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to validate the authenticity of state-changing requests. Pardakht Delkhah users should monitor vendor communications for patches or updates addressing this vulnerability and apply them promptly once available. In the interim, web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts by analyzing request headers and origins. Educating users to recognize phishing attempts and avoid clicking on suspicious links is critical to reduce the risk of exploitation. Additionally, enforcing strict Content Security Policies (CSP) and SameSite cookie attributes can help limit the ability of attackers to perform CSRF attacks. Regular security assessments and penetration testing focused on CSRF vectors should be conducted to identify and remediate weaknesses. Finally, restricting the exposure of Pardakht Delkhah interfaces to trusted networks or VPNs can reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-62101: CWE-352 Cross-Site Request Forgery (CSRF) in Omid Shamloo Pardakht Delkhah
Description
Cross-Site Request Forgery (CSRF) vulnerability in Omid Shamloo Pardakht Delkhah allows Cross Site Request Forgery.This issue affects Pardakht Delkhah: from n/a through 3.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-62101 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Pardakht Delkhah product developed by Omid Shamloo. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the application to perform unintended actions on behalf of the user. This specific vulnerability affects all versions up to 3.0.0 of Pardakht Delkhah. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires no privileges, but does require user interaction. The impact is limited to integrity, meaning attackers can cause unauthorized changes but cannot access confidential data or disrupt availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed proactively. The lack of authentication requirements and the low complexity make this a viable attack vector, especially in environments where users are frequently authenticated and interact with the application. The vulnerability is classified under CWE-352, which is a common web security weakness related to insufficient request validation against CSRF attacks.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the potential unauthorized modification of data or application state within Pardakht Delkhah. Since Pardakht Delkhah is likely used in payment or financial processing contexts, unauthorized actions could lead to fraudulent transactions, manipulation of payment details, or unauthorized changes to user accounts. Although confidentiality and availability are not directly affected, integrity breaches can undermine trust and lead to financial losses or regulatory non-compliance, especially under GDPR and other European data protection laws. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. Organizations with high volumes of online transactions or those relying on Pardakht Delkhah for critical payment workflows are at greater risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2025-62101, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies to validate the authenticity of state-changing requests. Pardakht Delkhah users should monitor vendor communications for patches or updates addressing this vulnerability and apply them promptly once available. In the interim, web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts by analyzing request headers and origins. Educating users to recognize phishing attempts and avoid clicking on suspicious links is critical to reduce the risk of exploitation. Additionally, enforcing strict Content Security Policies (CSP) and SameSite cookie attributes can help limit the ability of attackers to perform CSRF attacks. Regular security assessments and penetration testing focused on CSRF vectors should be conducted to identify and remediate weaknesses. Finally, restricting the exposure of Pardakht Delkhah interfaces to trusted networks or VPNs can reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:35:03.409Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695552dadb813ff03ef39011
Added to database: 12/31/2025, 4:44:10 PM
Last enriched: 1/20/2026, 10:24:18 PM
Last updated: 2/5/2026, 1:57:38 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighVS Code Configs Expose GitHub Codespaces to Attacks
MediumItaly Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.