CVE-2025-35030
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-29

Last updated on: 2025-10-02

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
Medical Informatics Engineering Enterprise Health has a cross site request forgery vulnerability that allows an unauthenticated attacker to trick administrative users into clicking a crafted URL and perform actions on behalf of that administrative user. This issue is fixed as of 2025-04-08.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-29
Last Modified
2025-10-02
Generated
2026-05-07
AI Q&A
2025-09-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
medical_informatics_engineering enterprise_health *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross site request forgery (CSRF) in Medical Informatics Engineering Enterprise Health. It allows an unauthenticated attacker to trick administrative users into clicking a specially crafted URL, which then causes the administrative user to unknowingly perform actions on behalf of the attacker.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized actions being performed with administrative privileges without the administrator's consent. This can compromise the integrity and security of the system, potentially leading to unauthorized changes or access to sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Apply the fix released as of 2025-04-08 for Medical Informatics Engineering Enterprise Health to address the cross site request forgery vulnerability. Until the patch is applied, avoid clicking on untrusted or suspicious URLs, especially for administrative users, to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart