CVE-2025-55744

4.3 MEDIUM

📋 TL;DR

UnoPim versions before 0.2.1 contain CSRF vulnerabilities in some endpoints, allowing attackers to trick authenticated users into performing unintended actions. This affects all UnoPim deployments using vulnerable versions, particularly those exposed to untrusted networks.

💻 Affected Systems

Products:
  • UnoPim
Versions: All versions before 0.2.1
Operating Systems: Any OS running UnoPim
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the Laravel-based web application endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate product data, modify user permissions, or perform administrative actions through authenticated user sessions, potentially compromising data integrity or system configuration.

🟠

Likely Case

Attackers could modify product information, change user settings, or perform limited administrative actions through social engineering attacks targeting authenticated users.

🟢

If Mitigated

With proper CSRF protections, requests would be rejected unless they include valid anti-CSRF tokens, preventing unauthorized actions even if users are tricked into clicking malicious links.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking authenticated users into visiting malicious websites or clicking crafted links. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.2.1

Vendor Advisory: https://github.com/unopim/unopim/security/advisories/GHSA-287x-6r2h-f9mw

Restart Required: No

Instructions:

1. Backup your current UnoPim installation and database. 2. Update UnoPim to version 0.2.1 or later using composer: 'composer require unopim/unopim:^0.2.1'. 3. Clear Laravel cache: 'php artisan cache:clear'. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Implement CSRF Middleware

all

Manually add CSRF protection to vulnerable endpoints by implementing Laravel's CSRF middleware or adding @csrf tokens to forms.

Add '@csrf' directive to vulnerable form templates
Ensure 'VerifyCsrfToken' middleware is applied to all POST/PUT/DELETE routes

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attack patterns
  • Restrict application access to trusted networks only and implement strict referrer policies

🔍 How to Verify

Check if Vulnerable:

Check if your UnoPim version is below 0.2.1 by examining the composer.json file or running 'composer show unopim/unopim'.

Check Version:

composer show unopim/unopim | grep versions

Verify Fix Applied:

After updating, verify the version is 0.2.1 or higher and test that forms require CSRF tokens by attempting to submit forms without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed POST requests missing CSRF tokens
  • Unusual administrative actions from unexpected user sessions
  • Requests with missing or invalid _token parameters

Network Indicators:

  • HTTP requests to UnoPim endpoints without Referer headers matching the application domain
  • POST requests originating from external domains to internal UnoPim endpoints

SIEM Query:

source="web_server" AND (uri_path="/unopim/*" AND (http_method="POST" OR http_method="PUT" OR http_method="DELETE") AND NOT csrf_token_present="true")

🔗 References

📤 Share & Export