CVE-2025-59891
CSRF Vulnerability in Sync Breeze and Disk Pulse Enterprise
Publication date: 2026-01-28
Last updated on: 2026-02-10
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flexense | syncbreeze | 10.4.18 |
| flexense | diskpulse | 10.4.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. It allows an authenticated user to trick another logged-in user into performing unwanted actions within the application. This happens because the application lacks proper CSRF token implementation. For example, an attacker could use a POST request to change a user's password or create new users by manipulating parameters like 'username', 'password', and 'cpassword' via the '/setup_login?sid=' endpoint.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized actions being performed on behalf of legitimate users without their consent. Specifically, attackers could change user passwords or create new user accounts, potentially leading to unauthorized access, privilege escalation, and compromise of the system's integrity and security.