Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62117: CWE-352 Cross-Site Request Forgery (CSRF) in Jayce53 EasyIndex

0
Medium
VulnerabilityCVE-2025-62117cvecve-2025-62117cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 13:56:26 UTC)
Source: CVE Database V5
Vendor/Project: Jayce53
Product: EasyIndex

Description

Cross-Site Request Forgery (CSRF) vulnerability in Jayce53 EasyIndex easyindex allows Cross Site Request Forgery.This issue affects EasyIndex: from n/a through 1.1.1704.

AI-Powered Analysis

AILast updated: 01/07/2026, 20:03:05 UTC

Technical Analysis

CVE-2025-62117 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Jayce53 EasyIndex, a web-based indexing and directory listing tool. The vulnerability affects all versions up to 1.1.1704. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request to a vulnerable web application, causing unintended actions without the user's consent. In this case, EasyIndex does not sufficiently validate the origin or authenticity of state-changing requests, allowing attackers to craft malicious links or web pages that, when visited by an authenticated user, execute unauthorized commands on their behalf. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact affects integrity and availability but not confidentiality, indicating that attackers can alter or disrupt certain functionalities but cannot access sensitive data directly. No patches have been released yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and should be addressed promptly. The vulnerability is categorized under CWE-352, which is a common web security weakness related to insufficient request validation.

Potential Impact

For European organizations, the CSRF vulnerability in EasyIndex could lead to unauthorized modification or disruption of web directory listings or indexing functions, potentially affecting website availability or integrity of displayed content. While confidentiality is not directly impacted, the alteration or denial of service could disrupt business operations, especially for organizations relying on EasyIndex for public or internal web content management. Attackers could leverage social engineering to induce users to perform unintended actions, which might also be chained with other vulnerabilities for more severe attacks. The medium severity indicates a moderate risk, but the actual impact depends on the deployment context and the sensitivity of the affected systems. Organizations in sectors such as government, education, or media that use EasyIndex for web content could face reputational damage or operational disruptions if exploited.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls to mitigate this CSRF vulnerability. These include: 1) Enforcing strict SameSite cookie attributes (preferably 'Strict' or 'Lax') to prevent cookies from being sent with cross-site requests. 2) Implementing anti-CSRF tokens in all state-changing forms and validating them server-side to ensure requests originate from legitimate sources. 3) Employing Content Security Policy (CSP) headers to restrict the domains that can execute scripts or submit forms. 4) Educating users about the risks of clicking on untrusted links or visiting suspicious websites while authenticated. 5) Monitoring web server logs for unusual or unexpected requests that may indicate exploitation attempts. 6) Considering temporary disabling or restricting access to EasyIndex interfaces if feasible until patches are released. 7) Keeping the EasyIndex installation and all related web server software up to date to reduce the attack surface. 8) Reviewing and limiting user privileges within EasyIndex to minimize potential damage from CSRF attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:34.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69552c1edb813ff03eeb80d4

Added to database: 12/31/2025, 1:58:54 PM

Last enriched: 1/7/2026, 8:03:05 PM

Last updated: 1/8/2026, 7:22:12 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats