Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62956: Cross-Site Request Forgery (CSRF) in iseremet Reloadly

0
High
VulnerabilityCVE-2025-62956cvecve-2025-62956
Published: Mon Oct 27 2025 (10/27/2025, 01:34:10 UTC)
Source: CVE Database V5
Vendor/Project: iseremet
Product: Reloadly

Description

Cross-Site Request Forgery (CSRF) vulnerability in iseremet Reloadly reloadly-topup-widget allows Stored XSS.This issue affects Reloadly: from n/a through <= 2.0.1.

AI-Powered Analysis

AILast updated: 11/13/2025, 12:52:29 UTC

Technical Analysis

CVE-2025-62956 is a critical security vulnerability identified in the iseremet Reloadly reloadly-topup-widget component, affecting all versions up to and including 2.0.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF issue is compounded by a Stored Cross-Site Scripting (XSS) vulnerability, allowing malicious scripts to be permanently stored on the target system and executed in the context of other users. The combined effect of CSRF and Stored XSS can lead to full compromise of user accounts, data theft, session hijacking, and potential service disruption. The CVSS 3.1 base score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no required privileges, but requiring user interaction, and its high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers aiming to exploit web-based payment or top-up services. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by organizations using Reloadly. The vulnerability affects the reloadly-topup-widget, a component likely integrated into web applications for mobile top-up services, making it relevant for fintech and telecom sectors. Attackers exploiting this flaw can perform unauthorized transactions, inject malicious scripts, and compromise user data, leading to financial loss and reputational damage.

Potential Impact

For European organizations, the impact of CVE-2025-62956 is significant, especially those relying on Reloadly for mobile top-up or payment processing. Exploitation can lead to unauthorized financial transactions, theft of sensitive user information, and widespread session hijacking. The Stored XSS component can facilitate persistent malware delivery, phishing, or further exploitation within the victim's network. This can disrupt business operations, cause regulatory compliance issues under GDPR due to data breaches, and damage customer trust. Given the high connectivity and digital payment adoption in Europe, a successful attack could cascade across multiple sectors including telecom, fintech, and e-commerce. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk to end-users. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for mitigation. Organizations failing to address this vulnerability risk significant financial and operational consequences.

Mitigation Recommendations

1. Monitor official channels for patches or updates from iseremet Reloadly and apply them immediately upon release. 2. Implement robust anti-CSRF tokens in all web forms and API endpoints associated with the reloadly-topup-widget to prevent unauthorized request forgery. 3. Conduct thorough input validation and output encoding to eliminate Stored XSS vectors, ensuring that all user-supplied data is sanitized before storage and rendering. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 5. Educate users and employees about phishing and social engineering tactics that could trigger CSRF attacks requiring user interaction. 6. Use web application firewalls (WAFs) configured to detect and block CSRF and XSS attack patterns targeting Reloadly components. 7. Regularly audit and review web application security configurations and logs for suspicious activities related to the reloadly-topup-widget. 8. Segment and isolate critical payment processing components to limit the blast radius of potential exploits. 9. Engage in threat hunting exercises focused on detecting early signs of exploitation attempts within the network.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:55.408Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed03423a7bbed324acc6a

Added to database: 10/27/2025, 1:51:48 AM

Last enriched: 11/13/2025, 12:52:29 PM

Last updated: 12/14/2025, 6:02:30 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats