CVE-2025-50902

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in old-peanut Open-Shop allows attackers to trick authenticated users into submitting malicious POST requests, potentially exposing sensitive information. It affects all users running vulnerable versions of the wechat_applet__open_source software. The vulnerability requires user interaction but can lead to data exposure.

💻 Affected Systems

Products:
  • old-peanut Open-Shop (wechat_applet__open_source)
Versions: All versions through 1.0.0
Operating Systems: All platforms running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the wechat mini-program open source shopping platform. All installations up to version 1.0.0 are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal sensitive user data, modify account settings, or perform unauthorized actions on behalf of authenticated users, potentially leading to data breaches or account compromise.

🟠

Likely Case

Attackers craft phishing emails or malicious websites that trick logged-in administrators into executing unwanted actions, potentially exposing customer data or modifying shop settings.

🟢

If Mitigated

With proper CSRF protections and user awareness training, the risk is significantly reduced as users would need to be tricked into visiting malicious sites while authenticated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and tricked into visiting a malicious page. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/old-peanut/wechat_applet__open_source/issues/IC95QM

Restart Required: No

Instructions:

1. Monitor the Gitee repository for updates. 2. Apply any available patches from the vendor. 3. Test the fix in a non-production environment first.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all state-changing POST requests

Implement anti-CSRF tokens in your application code

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax attributes on session cookies

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate users about phishing risks and require multi-factor authentication for sensitive operations

🔍 How to Verify

Check if Vulnerable:

Check if your application version is 1.0.0 or earlier and lacks CSRF protection on POST endpoints

Check Version:

Check the application's version configuration file or package.json for version information

Verify Fix Applied:

Test that all POST requests require valid CSRF tokens and that SameSite cookie attributes are properly set

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed POST requests from same IP with missing CSRF tokens
  • Unusual POST requests to sensitive endpoints

Network Indicators:

  • POST requests without Referer headers or with external Referers
  • Requests with missing CSRF tokens

SIEM Query:

source_ip=* AND http_method=POST AND (csrf_token=null OR referer_domain!=internal_domain)

🔗 References

📤 Share & Export