Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63060: Cross-Site Request Forgery (CSRF) in hogash Kallyas

0
Medium
VulnerabilityCVE-2025-63060cvecve-2025-63060
Published: Tue Dec 09 2025 (12/09/2025, 14:52:33 UTC)
Source: CVE Database V5
Vendor/Project: hogash
Product: Kallyas

Description

Cross-Site Request Forgery (CSRF) vulnerability in hogash Kallyas kallyas.This issue affects Kallyas: from n/a through <= 4.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 06:56:23 UTC

Technical Analysis

CVE-2025-63060 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the hogash Kallyas product, affecting versions up to and including 4.2. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application in which they are authenticated. This specific vulnerability requires low privileges (PR:L) but no user interaction (UI:N), meaning an attacker with some level of access can exploit it remotely (AV:N) without needing the victim to click or interact with malicious content. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability, indicating that sensitive information could be exposed or leaked, but the system's data or service availability remains intact. The CVSS score of 4.3 reflects a medium severity level, consistent with the limited impact and ease of exploitation. No known exploits have been reported in the wild, and no official patches have been linked yet, suggesting that organizations should remain vigilant and apply mitigations proactively. The vulnerability affects web applications built on the Kallyas platform, which is used primarily for content management and website development, making it a concern for organizations relying on this product for their online presence. The absence of CWE identifiers and patch links indicates that detailed technical remediation guidance may still be pending from the vendor or security community.

Potential Impact

For European organizations, the primary impact of CVE-2025-63060 is the potential unauthorized disclosure of sensitive information due to the confidentiality loss inherent in the CSRF vulnerability. While the vulnerability does not directly compromise data integrity or availability, the exposure of confidential data can lead to reputational damage, regulatory non-compliance (especially under GDPR), and potential secondary attacks leveraging leaked information. Organizations using Kallyas for their websites or internal portals may face risks of unauthorized actions being performed on behalf of authenticated users, potentially exposing user data or session information. The medium severity rating suggests that while the threat is not critical, it is significant enough to warrant attention, particularly for sectors handling personal or sensitive data such as finance, healthcare, and government services. Additionally, the lack of known exploits currently reduces immediate risk but does not eliminate the possibility of future exploitation as attackers develop techniques targeting this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-63060 effectively, organizations should implement strict CSRF protections by ensuring that all state-changing requests require a valid, unpredictable CSRF token that is verified on the server side. Web developers should validate the origin and referer headers to confirm requests originate from trusted sources. Limiting user privileges to the minimum necessary reduces the attack surface, as the vulnerability requires low privileges to exploit. Organizations should monitor vendor communications for official patches or updates and apply them promptly once available. Additionally, employing Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns can provide an additional layer of defense. Regular security audits and penetration testing focused on CSRF and related web vulnerabilities will help identify and remediate weaknesses proactively. User education on safe browsing practices, although less critical here due to no user interaction requirement, remains a good security hygiene practice.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:26:38.885Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383acb29cea75c35b76fe3

Added to database: 12/9/2025, 3:05:47 PM

Last enriched: 2/12/2026, 6:56:23 AM

Last updated: 3/25/2026, 12:07:08 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses