CVE-2025-59894
CSRF Vulnerability in Sync Breeze and Disk Pulse Enterprise
Publication date: 2026-01-28
Last updated on: 2026-02-10
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flexense | syncbreeze | 10.4.18 |
| flexense | diskpulse | 10.4.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. It allows an authenticated user to trick another logged-in user into performing unwanted actions within the application, such as deleting all commands, due to the lack of proper CSRF token implementation.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized actions being performed on behalf of a user without their consent, potentially resulting in data loss or manipulation, such as deleting all commands in the application. This can disrupt normal operations and compromise the integrity of the system.