CVE-2025-68434
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-17

Last updated on: 2025-12-18

Assigner: GitHub, Inc.

Description
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-17
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opensourcepos open_source_point_of_sale From 3.4.0 (inc) to 3.4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue in Open Source Point of Sale versions 3.4.0 up to before 3.4.2. The CSRF protection was explicitly disabled, allowing the application to accept state-changing POST requests without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by tricking a logged-in administrator into visiting a malicious web page, which causes the administrator's browser to send unauthorized requests to the application. This can lead to the attacker silently creating a new Administrator account with full privileges, resulting in complete system takeover.


How can this vulnerability impact me? :

The impact of this vulnerability is severe. An attacker can gain full administrative control over the Open Source Point of Sale system by creating a new Administrator account without authorization. This leads to a complete loss of confidentiality, integrity, and availability of the system, meaning sensitive data can be exposed or altered, and the system can be disrupted or controlled by the attacker.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, update Open Source Point of Sale to version 3.4.2 or later, which re-enables the CSRF filter and fixes associated issues. As a temporary workaround, you can manually re-enable the CSRF filter by uncommenting the protection line in the file app/Config/Filters.php, but this is not recommended without applying the full patch because it may cause functionality breakage in the Sales module due to token synchronization problems.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to silently create a new Administrator account with full privileges, leading to complete system takeover and loss of confidentiality, integrity, and availability. Such a compromise can result in unauthorized access to sensitive personal or health data, violating data protection requirements under standards like GDPR and HIPAA. Therefore, this vulnerability negatively impacts compliance by exposing the system to unauthorized data access and potential data breaches. [2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking if the Open Source Point of Sale (opensourcepos) application version is between 3.4.0 and 3.4.1 and verifying whether the CSRF protection filter is disabled in the app/Config/Filters.php file. Specifically, look for the 'csrf' filter line being commented out or missing in the 'before' array, which disables CSRF checks. Additionally, monitoring for suspicious POST requests that create new administrator accounts without valid CSRF tokens can indicate exploitation attempts. Since the vulnerability allows unauthorized POST requests without CSRF tokens, you can inspect HTTP logs for POST requests to endpoints like /index.php/employees/save/-1 with unusual parameters. A practical command to check the filter configuration on the server is to search for the 'csrf' filter line in the Filters.php file, for example: `grep -i csrf app/Config/Filters.php`. To detect suspicious POST requests in web server logs, you can use commands like: `grep 'POST /index.php/employees/save/-1' /var/log/apache2/access.log` (adjust path and log file as needed). For live network detection, tools like Wireshark or tcpdump can filter HTTP POST requests to the application server and analyze if CSRF tokens are missing or if unauthorized admin creation requests occur. However, no specific detection commands or scripts are provided in the resources. [4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart