CVE-2025-65593
📋 TL;DR
nopCommerce 4.90.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in its Schedule Tasks functionality. This allows attackers to trick authenticated administrators into performing unauthorized actions by visiting malicious web pages. All nopCommerce 4.90.0 installations with administrator access are affected.
💻 Affected Systems
- nopCommerce
📦 What is this software?
Nopcommerce by Nopcommerce
⚠️ Risk & Real-World Impact
Worst Case
Attackers could create, modify, or delete scheduled tasks, potentially disrupting business operations, stealing data, or establishing persistence through malicious task execution.
Likely Case
Attackers could modify existing scheduled tasks to run malicious code, disrupt automated processes, or cause service degradation.
If Mitigated
With proper CSRF protections and administrator awareness, exploitation risk is significantly reduced, though the vulnerability remains present.
🎯 Exploit Status
Exploitation requires tricking an authenticated administrator into visiting a malicious page. CSRF attacks are well-understood and easy to weaponize.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.90.1 or later
Vendor Advisory: https://www.nopcommerce.com/
Restart Required: Yes
Instructions:
1. Backup your nopCommerce installation and database. 2. Download the latest version from nopCommerce.com. 3. Replace the existing files with the patched version. 4. Restart the application/web server.
🔧 Temporary Workarounds
Implement CSRF Tokens
allManually add anti-CSRF tokens to Schedule Tasks endpoints
Restrict Administrator Access
allLimit administrator access to trusted networks and implement strict browser security policies
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block CSRF attempts
- Require re-authentication for sensitive actions like schedule task modifications
🔍 How to Verify
Check if Vulnerable:
Check if running nopCommerce version 4.90.0 by examining the Admin area → System → System Information
Check Version:
Check Admin → System → System Information in nopCommerce interface
Verify Fix Applied:
Verify version is 4.90.1 or later in System Information and test CSRF protection on Schedule Tasks endpoints
📡 Detection & Monitoring
Log Indicators:
- Unauthorized schedule task modifications
- Multiple failed CSRF token validations
- Unusual administrator activity patterns
Network Indicators:
- POST requests to schedule task endpoints without proper referrer headers
- Requests from unexpected sources to administrative endpoints
SIEM Query:
source="nopcommerce" AND (event="ScheduleTask" OR endpoint="/Admin/ScheduleTask/") AND status="200" AND referrer NOT CONTAINS "expected-domain"