Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65573: n/a

0
High
VulnerabilityCVE-2025-65573cvecve-2025-65573
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Request Forgery (CSRF) vulnerability in AllskyTeam AllSky v2024.12.06_06 allows remote attackers to cause a denial of service via function handle_interface_POST_and_status.

AI-Powered Analysis

AILast updated: 12/16/2025, 19:59:03 UTC

Technical Analysis

CVE-2025-65573 identifies a Cross Site Request Forgery (CSRF) vulnerability in the AllskyTeam AllSky software, specifically version 2024.12.06_06. The vulnerability resides in the function handle_interface_POST_and_status, which processes POST requests without adequate CSRF protections. CSRF attacks trick authenticated users into submitting unwanted requests to a web application, potentially causing unauthorized actions. In this case, the vulnerability allows remote attackers to trigger a denial of service (DoS) condition by exploiting the lack of CSRF validation, leading to service disruption. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high across all three security properties (C:H/I:H/A:H). Although no exploits are currently known in the wild and no patches have been released, the vulnerability poses a significant risk due to the ease of exploitation and the critical nature of the affected function. The CWE-352 classification confirms the root cause as insufficient CSRF protection. Organizations relying on AllSky for astronomical or environmental data collection and monitoring could face operational disruptions and potential data integrity issues if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-65573 could be substantial, especially for those utilizing AllSky software in scientific research, environmental monitoring, or infrastructure management. A successful CSRF attack could lead to denial of service, disrupting data collection and processing workflows, which may affect decision-making and operational continuity. The high confidentiality and integrity impact suggests that sensitive data handled by the software could be exposed or altered, potentially leading to misinformation or loss of trust in monitoring systems. The availability impact could cause downtime, affecting dependent services and stakeholders. Given the lack of authentication requirements and low attack complexity, attackers can exploit this vulnerability remotely with minimal effort, increasing the risk profile. The absence of patches further exacerbates the threat, requiring organizations to implement compensating controls promptly. Disruptions in critical monitoring systems could have cascading effects on public safety, research outcomes, and regulatory compliance within the European context.

Mitigation Recommendations

To mitigate CVE-2025-65573, European organizations should immediately implement strict CSRF protections on the AllSky web interface. This includes deploying anti-CSRF tokens for all state-changing POST requests and validating the Origin and Referer headers to ensure requests originate from trusted sources. Restricting the handle_interface_POST_and_status function to accept requests only from authenticated and authorized users can reduce exposure. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious POST requests that lack proper CSRF tokens or originate from untrusted domains. Organizations should monitor logs for unusual POST activity targeting the vulnerable function and conduct regular security assessments to identify potential exploitation attempts. Until an official patch is released, consider isolating the AllSky system from untrusted networks and limiting user access to trusted personnel. Additionally, educating users about the risks of CSRF and encouraging cautious behavior when interacting with web interfaces can reduce the likelihood of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69386e50ef540ebbadbb02e7

Added to database: 12/9/2025, 6:45:36 PM

Last enriched: 12/16/2025, 7:59:03 PM

Last updated: 2/4/2026, 3:19:58 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats