Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62950: Cross-Site Request Forgery (CSRF) in Wasiliy Strecker / ContestGallery developer Contest Gallery

0
Medium
VulnerabilityCVE-2025-62950cvecve-2025-62950
Published: Thu Nov 06 2025 (11/06/2025, 15:56:04 UTC)
Source: CVE Database V5
Vendor/Project: Wasiliy Strecker / ContestGallery developer
Product: Contest Gallery

Description

Cross-Site Request Forgery (CSRF) vulnerability in Wasiliy Strecker / ContestGallery developer Contest Gallery contest-gallery allows Cross Site Request Forgery.This issue affects Contest Gallery: from n/a through <= 28.0.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:00:40 UTC

Technical Analysis

CVE-2025-62950 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Contest Gallery plugin developed by Wasiliy Strecker, affecting versions up to 28.0.0. CSRF vulnerabilities enable attackers to induce authenticated users to perform actions they did not intend by exploiting the trust a web application places in the user's browser. In this case, the vulnerability allows an attacker to craft malicious requests that, when executed by a logged-in user with at least low privileges, can perform unauthorized actions within the Contest Gallery plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the attack can be launched remotely over the network with low attack complexity, requires the attacker to have some privileges (likely a low-level authenticated user), does not require user interaction, and impacts confidentiality slightly but does not affect integrity or availability. The vulnerability does not appear to have known exploits in the wild yet, and no patches or mitigations are listed at the time of publication. The nature of the vulnerability suggests that sensitive information could be exposed or unauthorized actions performed, but the impact is limited due to the requirement for some level of authentication and the absence of integrity or availability impact. The vulnerability is relevant for web environments using the Contest Gallery plugin, which is commonly used for managing photo contests and galleries on websites.

Potential Impact

For European organizations, the impact of CVE-2025-62950 is primarily related to the potential unauthorized execution of actions within the Contest Gallery plugin by attackers leveraging CSRF attacks. Although the confidentiality impact is limited, unauthorized actions could lead to exposure of user data or manipulation of contest entries, potentially damaging organizational reputation and user trust. Since the vulnerability requires low-level privileges, attackers might exploit compromised or low-privileged accounts to escalate their influence. The absence of integrity and availability impact reduces the risk of service disruption or data tampering. However, organizations with public-facing websites using this plugin could be targeted for indirect attacks or as part of broader attack chains. Compliance with European data protection regulations (e.g., GDPR) may be affected if personal data is exposed due to this vulnerability. The medium severity score suggests that while the threat is not critical, it should be addressed promptly to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2025-62950, European organizations should: 1) Monitor for and apply vendor patches or updates for the Contest Gallery plugin as soon as they become available. 2) Implement anti-CSRF tokens in all forms and state-changing requests within the plugin to ensure requests originate from legitimate sources. 3) Restrict user privileges to the minimum necessary, especially limiting the number of users with low-level privileges that can perform sensitive actions. 4) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin. 5) Conduct regular security audits and penetration testing focusing on web application vulnerabilities including CSRF. 6) Educate users and administrators about the risks of CSRF and encourage cautious behavior when interacting with suspicious links or websites. 7) Consider isolating or sandboxing the plugin environment to limit the scope of potential exploitation. 8) Review and harden session management and authentication mechanisms to prevent session hijacking that could facilitate CSRF exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:55.408Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59ce5

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 1/20/2026, 11:00:40 PM

Last updated: 2/5/2026, 4:31:33 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats