Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62762: Cross-Site Request Forgery (CSRF) in photoboxone SMTP Mail

0
Medium
VulnerabilityCVE-2025-62762cvecve-2025-62762
Published: Tue Dec 09 2025 (12/09/2025, 14:52:23 UTC)
Source: CVE Database V5
Vendor/Project: photoboxone
Product: SMTP Mail

Description

Cross-Site Request Forgery (CSRF) vulnerability in photoboxone SMTP Mail smtp-mail allows Cross Site Request Forgery.This issue affects SMTP Mail: from n/a through <= 1.3.47.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:40:36 UTC

Technical Analysis

CVE-2025-62762 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the photoboxone SMTP Mail product, affecting all versions up to and including 1.3.47. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the vulnerable application processes as legitimate. In this case, the SMTP Mail application does not adequately verify the origin or authenticity of requests that trigger sensitive actions, allowing an attacker to induce state-changing operations without the user's consent. The vulnerability is network exploitable without requiring prior authentication but does require user interaction, such as visiting a malicious website or clicking a crafted link. The impact primarily concerns the integrity of the SMTP Mail configuration or operations, as unauthorized commands could be executed, potentially altering mail routing or sending unauthorized emails. Confidentiality and availability are not directly impacted. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects these characteristics, with a base score of 4.3 (medium severity). No known exploits have been reported, and no official patches or mitigation links are currently available. The vulnerability was reserved in October 2025 and published in December 2025. Organizations relying on photoboxone SMTP Mail should monitor for vendor patches and apply mitigations promptly to prevent exploitation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modifications of SMTP Mail configurations or operations, potentially enabling attackers to manipulate email sending behavior, such as redirecting emails or sending phishing messages from trusted infrastructure. While it does not compromise confidentiality or availability directly, the integrity impact can facilitate further attacks like phishing or business email compromise (BEC). Organizations with critical email infrastructure relying on photoboxone SMTP Mail may face reputational damage and operational disruptions if attackers exploit this vulnerability. The requirement for user interaction reduces the risk somewhat but does not eliminate it, especially in environments with high user exposure to web content. The lack of authentication requirement increases the attack surface, making it easier for remote attackers to attempt exploitation. European organizations should consider the potential for targeted attacks leveraging this vulnerability, especially in sectors with high email communication volumes such as finance, government, and healthcare.

Mitigation Recommendations

1. Implement strict anti-CSRF tokens in all state-changing requests within the SMTP Mail application to ensure that only legitimate requests from authenticated users are processed. 2. Restrict HTTP methods to only those necessary and validate the origin and referer headers to detect and block cross-origin requests. 3. Employ Content Security Policy (CSP) headers to limit the ability of malicious sites to execute scripts or perform unauthorized requests. 4. Educate users about the risks of clicking on suspicious links or visiting untrusted websites to reduce the likelihood of user interaction exploitation. 5. Monitor network traffic for unusual SMTP Mail configuration changes or email sending patterns that could indicate exploitation attempts. 6. Segregate SMTP Mail management interfaces from general user access networks, using VPNs or internal-only access controls. 7. Stay updated with photoboxone vendor advisories and apply patches immediately once available. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting SMTP Mail endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-21T14:59:54.790Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383ac129cea75c35b76ee7

Added to database: 12/9/2025, 3:05:37 PM

Last enriched: 1/20/2026, 10:40:36 PM

Last updated: 2/4/2026, 6:04:59 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats