CVE-2025-59893
Unknown Unknown - Not Provided
CSRF Vulnerability in Sync Breeze and Disk Pulse Enterprise

Publication date: 2026-01-28

Last updated on: 2026-02-10

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request toΒ rename commands via '/rename_command?sid=', affecting the 'command_name' parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
flexense syncbreeze 10.4.18
flexense diskpulse 10.4.18
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. It allows an authenticated user to trick another logged-in user into performing unwanted actions within the application. This happens because the application lacks proper CSRF token implementation. For example, an attacker could send a POST request to rename commands by targeting the '/rename_command?sid=' endpoint and manipulating the 'command_name' parameter.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to cause unintended actions to be executed on your behalf within the affected applications if you are authenticated. This could lead to unauthorized changes such as renaming commands, potentially disrupting normal operations or causing confusion and misuse of the application features.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart