CVE-2025-6105
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-16

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in jflyfox jfinal_cms 5.0.1 and classified as problematic. This vulnerability affects unknown code of the file HOME.java. The manipulation of the argument Logout leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jflyfox jfinal_cms 5.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6105 is a Cross-Site Request Forgery (CSRF) vulnerability in the jflyfox jfinal_cms version 5.0.1, specifically in the HOME.java file's logout functionality. The vulnerability occurs because the logout method lacks CSRF protection mechanisms such as tokens or referer verification. This allows an attacker to trick a user into unknowingly performing a logout action by manipulating the logout argument remotely, without the user's consent. The attack requires the user to interact with a crafted request, such as viewing an attacker-controlled URL, which then forces the user to be logged out. [1, 3]


How can this vulnerability impact me? :

This vulnerability can disrupt user sessions by forcing users to log out without their consent, potentially causing inconvenience and loss of session continuity. It may also facilitate further attacks by disrupting normal user activity or enabling attackers to perform unauthorized actions on behalf of users. Although it does not directly compromise confidentiality or availability, it impacts the integrity of user sessions and can lead to privacy breaches and loss of trust in the affected application. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or unexpected logout requests targeting the /jfinal_cms/front/logout endpoint or similar logout functionality in jfinal_cms version 5.0.1. Network traffic inspection tools can be used to identify suspicious GET or POST requests containing the logout argument without proper CSRF tokens or referer headers. Commands such as using curl to simulate logout requests or inspecting web server logs for unusual logout activity can help detect exploitation attempts. For example, using curl: curl -v 'http://yourserver/jfinal_cms/front/logout?Logout=1' to test if logout can be triggered without CSRF protection. Additionally, reviewing web server access logs for repeated or automated logout requests may indicate exploitation attempts. [1, 2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing CSRF protection mechanisms such as adding CSRF tokens or referer header validation to the logout functionality to ensure requests are legitimate. Input validation and filtering should be enforced to prevent injection attacks. Minimizing database user permissions to avoid high-privilege accounts for routine operations is also recommended. Since no official patch or fix is currently available, consider replacing the affected component or upgrading to a version that addresses this vulnerability if available. Additionally, educating users to avoid clicking on suspicious links and monitoring for unusual logout activity can help reduce risk. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart