CVE-2025-25769

8.0 HIGH

📋 TL;DR

This CSRF vulnerability in Wangmarket v4.10 to v5.0 allows attackers to trick authenticated users into performing unintended actions via malicious requests to the UserController component. Attackers could modify user accounts, change permissions, or perform other administrative functions without the user's knowledge. All users running affected versions are vulnerable if they visit malicious sites while authenticated.

💻 Affected Systems

Products:
  • Wangmarket
Versions: v4.10 to v5.0
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the version range are vulnerable by default. Requires user authentication to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, privilege escalation to administrator, or unauthorized modification of all user accounts and system settings.

🟠

Likely Case

Attackers modify victim user profiles, change passwords, or alter permissions to gain unauthorized access to sensitive functions.

🟢

If Mitigated

Limited impact with proper CSRF tokens and same-origin policies in place, though some risk remains from sophisticated attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to trick authenticated users into visiting malicious pages. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.1 or later

Vendor Advisory: https://flowus.cn/share/56c86622-1e4d-47ed-923c-9e37aff00079

Restart Required: No

Instructions:

1. Download Wangmarket v5.1 or later from official sources. 2. Backup current installation. 3. Replace affected files with patched versions. 4. Verify CSRF protection is enabled in configuration.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests in UserController and validate them server-side.

Modify UserController.java to include CSRF token validation

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax attributes on session cookies to prevent cross-site requests.

Configure application server to set SameSite cookie attributes

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF patterns
  • Require re-authentication for sensitive operations and implement double-submit cookie pattern

🔍 How to Verify

Check if Vulnerable:

Check if Wangmarket version is between v4.10 and v5.0 inclusive, and verify if UserController endpoints lack CSRF protection.

Check Version:

Check application.properties or version file in Wangmarket installation directory

Verify Fix Applied:

Test that all UserController endpoints now require and validate CSRF tokens, and verify version is v5.1 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthorized user modifications from same IP
  • User permission changes without corresponding admin actions

Network Indicators:

  • HTTP POST requests to /controller/UserController without Referer header or with external origins

SIEM Query:

source="wangmarket" AND (uri="/controller/UserController" AND method="POST") AND (referer="" OR NOT referer CONTAINS "your-domain")

🔗 References

📤 Share & Export