Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62117: CWE-352 Cross-Site Request Forgery (CSRF) in Jayce53 EasyIndex

0
Medium
VulnerabilityCVE-2025-62117cvecve-2025-62117cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 13:56:26 UTC)
Source: CVE Database V5
Vendor/Project: Jayce53
Product: EasyIndex

Description

Cross-Site Request Forgery (CSRF) vulnerability in Jayce53 EasyIndex easyindex allows Cross Site Request Forgery.This issue affects EasyIndex: from n/a through 1.1.1704.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:26:53 UTC

Technical Analysis

CVE-2025-62117 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Jayce53 EasyIndex software, affecting all versions up to 1.1.1704. CSRF vulnerabilities occur when a web application does not adequately verify that requests intended to change state originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable application. In this case, EasyIndex lacks sufficient CSRF protections, such as anti-CSRF tokens or origin checks, enabling attackers to induce victims to submit unauthorized requests. The vulnerability does not require the attacker to have prior authentication or elevated privileges, but successful exploitation depends on the victim being authenticated and interacting with the attacker-controlled content (e.g., clicking a link). The CVSS v3.1 score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact is limited to integrity and availability, with no confidentiality loss. No patches or known exploits are currently available, indicating the vulnerability is newly disclosed. EasyIndex is a web indexing and directory listing tool, often deployed on web servers to organize and present file structures, making it a target for web-based attacks. Without mitigation, attackers could manipulate EasyIndex’s functionality to perform unauthorized actions such as modifying listings or disrupting service availability.

Potential Impact

For European organizations, the CSRF vulnerability in EasyIndex poses a moderate risk primarily to web server integrity and availability. Organizations using EasyIndex to manage public or internal file indexes could face unauthorized modifications or disruptions if attackers successfully trick authenticated users into submitting malicious requests. While confidentiality is not directly impacted, integrity issues could lead to misinformation or unauthorized content changes, potentially affecting business operations or user trust. Availability impacts could arise if attackers exploit the vulnerability to cause denial of service or disrupt indexing functions. The requirement for user interaction and authentication limits the attack scope but does not eliminate risk, especially in environments with many users or public-facing services. European entities relying on EasyIndex for critical web infrastructure or document management should prioritize mitigation to prevent exploitation. The absence of known exploits reduces immediate threat but does not preclude future attacks, especially as the vulnerability becomes more widely known.

Mitigation Recommendations

To mitigate CVE-2025-62117, organizations should implement robust CSRF protections within EasyIndex deployments. This includes adding anti-CSRF tokens to all state-changing requests and validating these tokens server-side to ensure requests originate from legitimate user sessions. Additionally, verifying the HTTP Referer or Origin headers can help confirm request legitimacy. Restricting sensitive operations to POST requests rather than GET requests reduces risk, as GET requests are more easily exploited via embedded links or images. Organizations should also enforce secure session management and consider implementing Content Security Policy (CSP) headers to limit cross-origin interactions. Monitoring web server logs for unusual request patterns and educating users about phishing risks can further reduce exploitation likelihood. Since no official patches are currently available, organizations may need to apply custom fixes or isolate EasyIndex instances behind additional security layers such as web application firewalls (WAFs) configured to detect and block CSRF attempts. Regularly checking for vendor updates and applying patches promptly once released is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:34.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69552c1edb813ff03eeb80d4

Added to database: 12/31/2025, 1:58:54 PM

Last enriched: 1/20/2026, 10:26:53 PM

Last updated: 2/6/2026, 10:25:08 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats