CVE-2025-63717
BaseFortify
Publication date: 2025-11-07
Last updated on: 2025-11-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mayurik | pet_grooming_management_software | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the change password functionality of SourceCodester Pet Grooming Management Software 1.0. Specifically, the endpoint /pet_grooming/admin/change_pass.php does not use proper anti-CSRF tokens or same-site cookie restrictions, which allows attackers to trick authenticated users into unknowingly changing their passwords.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to change the password of an authenticated user without their consent. This can lead to unauthorized account access, loss of control over the affected account, and potential further compromise of the system or sensitive data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, implement anti-CSRF tokens in the change password functionality and enforce same-site cookie restrictions to prevent unauthorized password changes via CSRF attacks.