Responsible Vulnerability Disclosures

|

HIGH Cross-Site Request Forgery in Profile Update Module

November 2025
Organization: Open-source Web Application (CarRentalMS)
Vulnerability Type: Cross-Site Request Forgery (CSRF)
CVE-ID: CVE-2025-66683
Description: The application lacked anti-CSRF protection in sensitive profile update endpoints, enabling attackers to trigger unauthorized state-changing requests through crafted external pages.
Impact:
  • Unauthorized modification of user account information
  • Account integrity compromise
  • Potential privilege abuse in administrative contexts
  • Foundation for chained attacks
CVSS Score: 8.1 (High)
Remediation:
  • Implement anti-CSRF tokens in all state-changing requests
  • Validate origin and referer headers
  • Enforce same-site cookie attributes
  • Apply secure session handling practices
Timeline:
2025-11-17: Vulnerability discovered
2026-11-08: CVE assigned
2026-01-11: Vendor notified via GitHub
2026-01-11: Public issue created
2026-XX-XX: CVE Published
Status: Reserved

MEDIUM Information Disclosure via Debug Stack Trace

December 2025
Organization: National Testing Agency (NTA)
Vulnerability Type: Information Disclosure (CWE-209)
CERTIn Reference ID: CERTIn-64284725
Description: A public-facing login module exposed a full backend debug stack trace, revealing internal file paths, framework details, database query structures, and server configuration information.
Impact:
  • Exposure of backend architecture and technology stack
  • Disclosure of internal file paths and database schema hints
  • Increased risk of targeted exploitation
  • Reconnaissance advantage for attackers
CVSS Score: 6.5 (Medium)
Remediation:
  • Disable debug mode in production environments
  • Implement generic error handling pages
  • Restrict sensitive error logging to server-side logs
  • Harden production framework configurations
Timeline:
2025-12-02: Vulnerability discovered
2025-12-02: Responsible disclosure submitted
2025-12-02: Acknowledgment received
Status: Resolved