CVE-2025-5885
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-09

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in Konica Minolta bizhub up to 20250202 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
konica_minolta bizhub 20250202
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-5885 is a Cross-Site Request Forgery (CSRF) vulnerability in the Konica Minolta bizhub printer web interface. It occurs because the web application does not properly verify that requests to perform critical actions, such as deleting user boxes, are intentionally submitted by an authenticated user. This allows an attacker to craft malicious requests that, when triggered by a user, can perform unauthorized actions remotely without proper authorization. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing remote attackers to perform unauthorized actions on the affected Konica Minolta bizhub device, such as deleting user boxes without permission. This compromises the integrity of the system and can disrupt normal operations. The attack can be executed without authentication but requires user interaction, making it moderately easy to exploit. There are no known mitigations, and the exploit is publicly available. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for unauthorized or suspicious HTTP requests to the Konica Minolta bizhub web interface, especially requests targeting the 'User Box List' and actions such as box deletion without proper authentication. Since the vulnerability involves CSRF on the web interface, inspecting web server logs for unexpected POST requests to box deletion endpoints or unusual user box registration/deletion activity may help. Specific commands are not provided in the resources, but using tools like curl or browser developer tools to simulate or observe such requests could assist in detection. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the Konica Minolta bizhub web interface to trusted networks or users, disabling remote access if possible, and monitoring for suspicious activity. Since no known countermeasures or mitigations have been identified and the vulnerability lacks proper CSRF protections, it is suggested to consider replacing the affected product with an alternative. Applying any available firmware updates or vendor patches, if released, would also be advisable. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart