The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Title CVE-2025-27454
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2025-07-03T11:30:19.944Z

Updated: 2025-07-03T13:16:05.545Z

Reserved: 2025-02-26T08:39:58.980Z

Link: CVE-2025-27454

cve-icon Vulnrichment

Updated: 2025-07-03T13:04:18.380Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-03T12:15:23.380

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-27454

cve-icon Redhat

No data.