CVE-2025-64515

4.3 MEDIUM

📋 TL;DR

Open Forms versions before 3.2.7 and 3.3.3 contain an input validation vulnerability where form fields marked as readonly or disabled on the client side can be modified by malicious users. This allows attackers to submit data they shouldn't have access to modify. Organizations using vulnerable Open Forms installations are affected.

💻 Affected Systems

Products:
  • Open Forms
Versions: All versions before 3.2.7 and before 3.3.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects forms where prefill data fields are dynamically set to readonly/disabled. Regular forms without such configurations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could modify sensitive pre-filled data in forms, potentially altering critical information like financial data, personal identifiers, or system configurations that should be immutable.

🟠

Likely Case

Attackers modify form data they shouldn't have access to, potentially bypassing business logic validation and submitting unauthorized data changes.

🟢

If Mitigated

With proper server-side validation, modified data would be rejected, limiting impact to failed submission attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with forms and knowledge of how to modify client-side disabled fields. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.7 or 3.3.3

Vendor Advisory: https://github.com/open-formulieren/open-forms/security/advisories/GHSA-cp63-63mq-5wvf

Restart Required: Yes

Instructions:

1. Backup your Open Forms installation and database. 2. Update to version 3.2.7 (for 3.2.x branch) or 3.3.3 (for 3.3.x branch). 3. Restart the Open Forms application service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement server-side validation

all

Add server-side validation to reject any submissions where readonly/disabled fields have been modified from their original values.

Disable dynamic readonly/disabled fields

all

Temporarily remove dynamic readonly/disabled field configurations from vulnerable forms until patching can be completed.

🧯 If You Can't Patch

  • Implement strict server-side validation for all form submissions to reject modified readonly fields
  • Monitor form submission logs for unusual patterns or modifications to readonly fields

🔍 How to Verify

Check if Vulnerable:

Check your Open Forms version. If it's below 3.2.7 (for 3.2.x) or below 3.3.3 (for 3.3.x), you are vulnerable. Test forms with readonly/disabled fields by attempting to modify them via browser developer tools.

Check Version:

Check the Open Forms admin interface or application configuration files for version information.

Verify Fix Applied:

After updating, test that readonly/disabled form fields cannot be successfully modified and submitted. Verify the application version shows 3.2.7 or 3.3.3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions where readonly fields appear modified
  • Form validation errors related to readonly field modifications
  • Multiple failed submission attempts on forms with readonly fields

Network Indicators:

  • POST requests to form submission endpoints with modified readonly field values
  • Unusual payload sizes or structures in form submissions

SIEM Query:

source="open-forms" AND (event_type="form_submission" AND readonly_field_modified="true")

🔗 References

📤 Share & Export