Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65593: n/a

0
High
VulnerabilityCVE-2025-65593cvecve-2025-65593
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

nopCommerce 4.90.0 is vulnerable to Cross Site Request Forgery (CSRF) via the Schedule Tasks functionality.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:29:43 UTC

Technical Analysis

CVE-2025-65593 identifies a Cross Site Request Forgery (CSRF) vulnerability in nopCommerce version 4.90.0, specifically targeting the Schedule Tasks functionality. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request, which the server trusts and executes. In this case, the vulnerability allows an attacker to perform unauthorized actions on the Schedule Tasks feature without requiring any privileges or authentication, only relying on the victim's interaction (e.g., clicking a malicious link). The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality, integrity, and availability is high, as attackers could manipulate scheduled tasks to execute arbitrary commands, disrupt operations, or exfiltrate sensitive data. nopCommerce is a popular open-source e-commerce platform, and the Schedule Tasks functionality is critical for automating backend processes. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a significant risk if weaponized.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on nopCommerce 4.90.0 for their online retail operations. Successful exploitation could allow attackers to manipulate scheduled tasks, potentially leading to unauthorized data access, modification, or deletion, and disruption of business-critical automated processes. This could result in financial losses, reputational damage, and regulatory non-compliance, particularly under GDPR requirements for protecting customer data. The high severity and ease of exploitation mean that attackers could quickly leverage this vulnerability to compromise e-commerce platforms, affecting customer trust and operational continuity. Organizations with publicly accessible administrative interfaces are at higher risk, as attackers can more easily lure administrators into executing malicious requests. The absence of known exploits currently provides a window for proactive defense, but the threat landscape could rapidly evolve.

Mitigation Recommendations

To mitigate CVE-2025-65593, organizations should immediately review and restrict access to the Schedule Tasks functionality, limiting it to trusted administrative users and secure network segments. Implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies in the nopCommerce application, ensuring that all state-changing requests require valid CSRF tokens. Monitor administrative activity logs for unusual task scheduling or modifications. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting nopCommerce endpoints. Educate administrators about the risks of clicking unsolicited links while authenticated to the platform. Since no official patches are available yet, consider temporary compensating controls such as disabling the Schedule Tasks feature if feasible or isolating the administrative interface behind VPN or IP whitelisting. Stay alert for vendor updates and apply patches promptly once released. Conduct penetration testing focused on CSRF vectors to validate the effectiveness of implemented mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941ae5b0d5f6f4391b0c390

Added to database: 12/16/2025, 7:09:15 PM

Last enriched: 12/23/2025, 7:29:43 PM

Last updated: 2/7/2026, 9:12:10 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats