CVE-2025-56710
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-09-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| phpgurukul | student_result_management_system | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-56710 is a Cross-Site Request Forgery (CSRF) vulnerability in the Profile Page of the PHPGurukul Student-Result-Management-System-Using-PHP-V2.0. It allows an attacker to trick authenticated users into unintentionally modifying their account details by submitting unauthorized requests. The attacker crafts a malicious HTML page that automatically sends requests to the vulnerable endpoint /create-class.php, such as adding a student to a class, without the user's knowledge or interaction. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to perform unauthorized actions on your behalf within the application if you are authenticated. For example, an attacker could add students to classes or modify account details without your consent, potentially leading to data integrity issues, unauthorized data changes, and misuse of your account privileges. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by capturing and analyzing HTTP requests to the vulnerable endpoint `/create-class.php` using an intercepting proxy tool such as Burp Suite. By observing if requests to this endpoint can be executed without proper anti-CSRF tokens or validation, you can confirm the presence of the CSRF flaw. Specifically, you can use Burp Suite Professional's "CSRF PoC Generator" to generate a proof-of-concept HTML file that simulates the attack. Commands per se are not provided, but using Burp Suite or similar tools to intercept and analyze requests is recommended. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing CSRF protection mechanisms such as adding anti-CSRF tokens to forms and validating them on the server side. Refer to the OWASP Cross-Site Request Forgery Prevention Cheat Sheet for best practices. Additionally, ensure that sensitive actions like those on `/create-class.php` require proper user interaction and validation to prevent unauthorized requests from being executed automatically. [1]