CVE-2025-59893
CSRF Vulnerability in Sync Breeze and Disk Pulse Enterprise
Publication date: 2026-01-28
Last updated on: 2026-02-10
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flexense | syncbreeze | 10.4.18 |
| flexense | diskpulse | 10.4.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. It allows an authenticated user to trick another logged-in user into performing unwanted actions within the application. This happens because the application lacks proper CSRF token implementation. For example, an attacker could send a POST request to rename commands by targeting the '/rename_command?sid=' endpoint and manipulating the 'command_name' parameter.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to cause unintended actions to be executed on your behalf within the affected applications if you are authenticated. This could lead to unauthorized changes such as renaming commands, potentially disrupting normal operations or causing confusion and misuse of the application features.