CVE-2025-27454
03.07.2025, 12:15
The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Common Weakness Enumeration
References