{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9747","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-30T20:57:01.319Z","datePublished":"2025-08-31T21:32:07.963Z","dateUpdated":"2025-09-02T15:12:53.887Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-31T21:32:07.963Z"},"title":"Koillection csrf_protection_controller.js cross-site request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-352","lang":"en","description":"Cross-Site Request Forgery"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-862","lang":"en","description":"Missing Authorization"}]}],"affected":[{"vendor":"n/a","product":"Koillection","versions":[{"version":"1.6.0","status":"affected"},{"version":"1.6.1","status":"affected"},{"version":"1.6.2","status":"affected"},{"version":"1.6.3","status":"affected"},{"version":"1.6.4","status":"affected"},{"version":"1.6.5","status":"affected"},{"version":"1.6.6","status":"affected"},{"version":"1.6.7","status":"affected"},{"version":"1.6.8","status":"affected"},{"version":"1.6.9","status":"affected"},{"version":"1.6.10","status":"affected"},{"version":"1.6.11","status":"affected"},{"version":"1.6.12","status":"affected"},{"version":"1.6.13","status":"affected"},{"version":"1.6.14","status":"affected"},{"version":"1.6.15","status":"affected"},{"version":"1.6.16","status":"affected"},{"version":"1.6.17","status":"affected"},{"version":"1.6.18","status":"affected"},{"version":"1.7.0","status":"unaffected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Koillection up to 1.6.18. Affected is an unknown function of the file assets/controllers/csrf_protection_controller.js. Such manipulation leads to cross-site request forgery. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.0 is able to address this issue. The name of the patch is 9ab8562d3f1e953da93fed63f9ee802c7ea26a9a. It is suggested to upgrade the affected component. The vendor explains: \"I ended up switching to a newer CSRF handling using stateless token.\""},{"lang":"de","value":"In Koillection bis 1.6.18 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist ein unbekannter Ablauf der Datei assets/controllers/csrf_protection_controller.js. Mittels dem Manipulieren mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden. Durch ein Upgrade auf Version 1.7.0 kann dieses Problem behoben werden. Der Patch trägt den Namen 9ab8562d3f1e953da93fed63f9ee802c7ea26a9a. Es wird geraten, die betroffene Komponente zu aktualisieren."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-08-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-30T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-30T23:02:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"balejin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.322047","name":"VDB-322047 | Koillection csrf_protection_controller.js cross-site request forgery","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.322047","name":"VDB-322047 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.640421","name":"Submit #640421 | GitHub koillection 1.6.18 Cross-Site Request Forgery","tags":["third-party-advisory"]},{"url":"https://github.com/benjaminjonard/koillection/issues/1393","tags":["issue-tracking"]},{"url":"https://github.com/benjaminjonard/koillection/issues/1393#issuecomment-3217310072","tags":["issue-tracking"]},{"url":"https://github.com/benjaminjonard/koillection/issues/1393#issue-3347724086","tags":["exploit","issue-tracking"]},{"url":"https://github.com/benjaminjonard/koillection/commit/9ab8562d3f1e953da93fed63f9ee802c7ea26a9a","tags":["patch"]},{"url":"https://github.com/benjaminjonard/koillection/releases/tag/1.7.0","tags":["patch"]}],"tags":["x_open-source"]},"adp":[{"references":[{"url":"https://github.com/benjaminjonard/koillection/issues/1393#issuecomment-3217310072","tags":["exploit"]},{"url":"https://github.com/benjaminjonard/koillection/issues/1393","tags":["exploit"]},{"url":"https://github.com/benjaminjonard/koillection/issues/1393#issue-3347724086","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-02T14:35:14.764346Z","id":"CVE-2025-9747","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-02T15:12:53.887Z"}}]}}