Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63952: n/a

0
Unknown
VulnerabilityCVE-2025-63952cvecve-2025-63952
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-Site Request Forgery (CSRF) in the /mwapi?method=add-user component of Magewell Pro Convert v1.2.213 allows attackers to arbitrarily create accounts via a crafted GET request.

AI-Powered Analysis

AILast updated: 11/24/2025, 16:41:18 UTC

Technical Analysis

CVE-2025-63952 is a security vulnerability identified in Magewell Pro Convert version 1.2.213, specifically in the /mwapi?method=add-user API endpoint. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows an attacker to create user accounts arbitrarily by sending a specially crafted GET request to the vulnerable endpoint. CSRF vulnerabilities occur when a web application does not properly verify that requests to perform state-changing operations originate from legitimate users or trusted sources. In this case, the lack of CSRF protections on the add-user method means that an attacker can trick an authenticated user or exploit the endpoint directly to add new accounts without proper authorization. The vulnerability does not require prior authentication or user interaction, increasing its exploitability. Although no CVSS score has been assigned and no patches or known exploits are currently reported, the flaw poses a significant risk because unauthorized account creation can lead to privilege escalation, unauthorized access to sensitive video streaming and conversion systems, and potential disruption of media workflows. Magewell Pro Convert devices are widely used in professional video streaming and broadcasting environments, making this vulnerability particularly relevant to organizations relying on these devices for critical media infrastructure. The absence of patches necessitates immediate attention to mitigate potential exploitation.

Potential Impact

The exploitation of CVE-2025-63952 could have several impacts on European organizations using Magewell Pro Convert devices. Unauthorized account creation can lead to privilege escalation, allowing attackers to gain elevated access rights within the device or network. This could compromise the confidentiality of video streams, disrupt media workflows, or allow attackers to manipulate or intercept video content. The integrity of the device's configuration and operation could be undermined, potentially causing service outages or degraded performance. Additionally, unauthorized accounts could be used as footholds for further lateral movement within an organization's network, increasing the risk of broader compromise. Given the critical role of video streaming and conversion in media production, broadcasting, and corporate communications, such disruptions could have significant operational and reputational consequences. The lack of known exploits in the wild suggests the threat is currently theoretical but warrants proactive mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-63952, organizations should implement the following specific measures: 1) Restrict network access to the /mwapi?method=add-user endpoint by applying firewall rules or network segmentation to limit exposure only to trusted management networks or administrators. 2) Employ web application firewalls (WAFs) that can detect and block CSRF attack patterns or anomalous GET requests targeting the add-user API. 3) Monitor logs for unusual account creation activity or repeated requests to the vulnerable endpoint to detect potential exploitation attempts early. 4) If possible, disable or restrict the add-user API functionality until a vendor patch is available. 5) Engage with Magewell support to obtain updates or patches addressing this vulnerability and apply them promptly once released. 6) Educate administrators and users about the risks of CSRF and encourage the use of secure management practices, including strong authentication and session management. 7) Consider implementing additional authentication or token-based verification mechanisms on the API endpoints to prevent unauthorized requests. These targeted actions go beyond generic advice by focusing on access control, monitoring, and compensating controls tailored to the specific vulnerable component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69248a62ea0759ac8b7c828b

Added to database: 11/24/2025, 4:40:02 PM

Last enriched: 11/24/2025, 4:41:18 PM

Last updated: 11/24/2025, 5:57:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats