Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67595: Cross-Site Request Forgery (CSRF) in Ays Pro Quiz Maker

0
Medium
VulnerabilityCVE-2025-67595cvecve-2025-67595
Published: Tue Dec 09 2025 (12/09/2025, 14:14:18 UTC)
Source: CVE Database V5
Vendor/Project: Ays Pro
Product: Quiz Maker

Description

Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker quiz-maker allows Cross Site Request Forgery.This issue affects Quiz Maker: from n/a through <= 6.7.0.82.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:51:17 UTC

Technical Analysis

CVE-2025-67595 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Ays Pro Quiz Maker product, affecting all versions up to 6.7.0.82. CSRF vulnerabilities arise when a web application does not sufficiently verify that requests made to it originate from authenticated and authorized users, allowing attackers to craft malicious web pages or links that, when visited by an authenticated user, cause unintended actions to be executed on the vulnerable application. In this case, the Quiz Maker application lacks adequate CSRF protections, such as anti-CSRF tokens or proper origin checks, enabling attackers to exploit this flaw. The vulnerability could allow attackers to perform unauthorized operations such as modifying quiz content, changing settings, or manipulating user data within the Quiz Maker environment, depending on the privileges of the victim user. Although no public exploits are currently known, the vulnerability's presence in a widely used quiz management tool poses a significant risk, especially in educational and corporate training environments that rely on this software for assessments. The absence of a CVSS score indicates that the vulnerability has not yet been fully evaluated for severity, but the nature of CSRF attacks typically affects the integrity and availability of the application. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, emphasizing the need for immediate attention from users of the affected versions.

Potential Impact

For European organizations, the impact of this CSRF vulnerability can be substantial, particularly for those in education, corporate training, and certification sectors where Ays Pro Quiz Maker is deployed. Unauthorized actions triggered by CSRF could lead to manipulation of quiz content, unauthorized changes to user data, or disruption of assessment processes, undermining the integrity of evaluations and potentially causing reputational damage. In regulated environments, such as those governed by GDPR, unauthorized data manipulation could also lead to compliance violations and legal consequences. The vulnerability could also be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or social engineering tactics. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details become widely known. Organizations relying on this software must consider the risk to their operational continuity and data integrity, especially where quizzes influence critical decision-making or certification outcomes.

Mitigation Recommendations

To mitigate this CSRF vulnerability, organizations should first monitor for patches or updates from Ays Pro and apply them promptly once available. In the interim, administrators should implement web application firewall (WAF) rules that detect and block suspicious CSRF attempts targeting the Quiz Maker endpoints. Additionally, enforcing strict Content Security Policy (CSP) headers can reduce the risk of malicious cross-origin requests. Organizations should also review and harden user session management, ensuring that session tokens are securely handled and that user privileges are minimized to reduce potential damage. Educating users about the risks of clicking on untrusted links while authenticated can help reduce exploitation likelihood. If possible, disabling or restricting quiz modification features to trusted IP ranges or authenticated sessions with multi-factor authentication can further reduce risk. Finally, conducting security audits and penetration testing focused on CSRF and related vulnerabilities in the Quiz Maker environment will help identify and remediate weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:48.325Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ae29cea75c35ae5776

Added to database: 12/9/2025, 2:35:26 PM

Last enriched: 12/9/2025, 2:51:17 PM

Last updated: 12/11/2025, 1:37:38 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats