Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62797: CWE-352: Cross-Site Request Forgery (CSRF) in rathena FluxCP

0
High
VulnerabilityCVE-2025-62797cvecve-2025-62797cwe-352
Published: Wed Oct 29 2025 (10/29/2025, 17:49:07 UTC)
Source: CVE Database V5
Vendor/Project: rathena
Product: FluxCP

Description

FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.

AI-Powered Analysis

AILast updated: 10/29/2025, 18:14:37 UTC

Technical Analysis

CVE-2025-62797 is a critical Cross-Site Request Forgery (CSRF) vulnerability identified in FluxCP, the web-based control panel for rAthena servers, which are used to manage Ragnarok game servers. The vulnerability arises because FluxCP’s state-changing POST endpoints rely solely on session cookies for authorization without implementing per-request anti-CSRF tokens or robust Origin/Referer header validation. This design flaw allows an attacker to craft malicious web pages that, when visited by an authenticated user, cause the user’s browser to send unauthorized requests to the FluxCP server, performing sensitive actions without the user's consent. The vulnerability does not require the attacker to have any privileges or the victim to perform any action other than visiting a malicious page, making exploitation relatively straightforward. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The vulnerability impacts confidentiality and integrity by allowing unauthorized state changes, potentially leading to account compromise or server misconfiguration. The issue was fixed in commit e3f130c, which presumably introduced anti-CSRF tokens or improved origin validation. No known exploits have been reported in the wild yet, but the high CVSS score reflects the potential severity. FluxCP is widely used in the rAthena community, which has a global user base including many European servers, making this a relevant threat for European organizations hosting or managing Ragnarok game servers.

Potential Impact

For European organizations running rAthena servers with FluxCP, this vulnerability could lead to unauthorized changes to server configurations, user account modifications, or other sensitive operations performed without user consent. This can result in service disruption, loss of user trust, or unauthorized access to administrative functions. Given the popularity of Ragnarok servers in Europe, especially in countries with active gaming communities and hosting providers, the impact could be significant. Attackers could leverage this vulnerability to manipulate game server settings, potentially causing downtime or enabling further attacks such as privilege escalation or data theft. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch before widespread exploitation. However, the ease of exploitation and the high CVSS score indicate that once exploited, the consequences could be severe, affecting availability and integrity of services.

Mitigation Recommendations

The primary mitigation is to apply the fix introduced in commit e3f130c4a2ccd615a3ee2ee0302ecbfbd84747e6, which addresses the CSRF vulnerability. Organizations should ensure their FluxCP installations are updated to this version or later. Additionally, administrators should implement per-request anti-CSRF tokens for all state-changing POST endpoints to prevent unauthorized requests. Robust validation of the Origin and Referer headers should be enforced to ensure requests originate from trusted sources. Server administrators should also educate users about the risks of visiting untrusted websites while logged into administrative panels. Network-level protections such as Content Security Policy (CSP) and SameSite cookie attributes can provide additional layers of defense. Regular security audits and monitoring for unusual administrative actions can help detect exploitation attempts early. Finally, organizations should maintain an incident response plan tailored to web application attacks to minimize damage if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-22T18:55:48.011Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6902561b52c03fa7b6e5bf0d

Added to database: 10/29/2025, 5:59:55 PM

Last enriched: 10/29/2025, 6:14:37 PM

Last updated: 10/30/2025, 1:02:51 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats