CVE-2025-7078

4.3 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in 07FLYCMS, 07FLY-CMS, and 07FlyCRM products up to version 1.3.9. Attackers can trick authenticated users into performing unintended actions on the web application. Organizations using these affected versions are vulnerable to CSRF attacks.

💻 Affected Systems

Products:
  • 07FLYCMS
  • 07FLY-CMS
  • 07FlyCRM
Versions: Up to and including 1.3.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects unknown code components within these products. All deployments up to version 1.3.9 are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform administrative actions like creating new admin accounts, changing configurations, or deleting data by tricking authenticated administrators.

🟠

Likely Case

Attackers trick regular users into changing their own profile information, passwords, or performing other actions within their privilege level.

🟢

If Mitigated

With proper CSRF protections, the vulnerability is neutralized and no unauthorized actions can be performed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed on GitHub. CSRF attacks typically require user interaction but are easy to execute once crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available as the vendor did not respond to disclosure. Consider upgrading if a patched version becomes available.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing forms and API endpoints

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax attributes on session cookies

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with CSRF protection rules
  • Require re-authentication for sensitive operations and implement double-submit cookie pattern

🔍 How to Verify

Check if Vulnerable:

Check if your 07FLYCMS/07FlyCRM version is 1.3.9 or earlier. Review application code for missing CSRF protections on forms and API endpoints.

Check Version:

Check the application's admin panel or configuration files for version information

Verify Fix Applied:

Test that all forms and state-changing endpoints require and validate CSRF tokens. Verify SameSite cookie attributes are properly set.

📡 Detection & Monitoring

Log Indicators:

  • Multiple state-changing requests from same user without corresponding CSRF token validation
  • Requests with missing or invalid anti-CSRF tokens

Network Indicators:

  • HTTP requests with Referer headers pointing to external domains performing state-changing actions

SIEM Query:

web_requests WHERE (action IN ['POST', 'PUT', 'DELETE']) AND (csrf_token IS NULL OR csrf_token_validation = 'failed')

🔗 References

📤 Share & Export