CVE-2025-22963
Published: 13 January 2025
Summary
CVE-2025-22963 is a high-severity CSRF (CWE-352) vulnerability in Sismics Teedy. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity mechanisms such as anti-CSRF tokens, directly preventing forged POST requests to the /api/user/admin endpoint for account takeover.
SI-2 requires timely flaw remediation, including patching or upgrading Teedy beyond version 1.11 to eliminate the specific CSRF vulnerability.
SI-10 mandates validation of inputs to the /api/user/admin endpoint, such as CSRF tokens or referer headers, blocking unauthorized cross-site requests.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF vulnerability (CVE-2025-22963) in Teedy enables exploitation of a public-facing web application via POST /api/user/admin, allowing remote attackers to perform unauthorized account modifications (e.g., password changes) on authenticated users, leading to account takeover.
NVD Description
Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.
Deeper analysisAI
CVE-2025-22963, published on 2025-01-13, is a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in Teedy through version 1.11. The issue enables account takeover through a POST request to the /api/user/admin endpoint, with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this by tricking a logged-in user into performing an action, such as visiting a malicious webpage (UI:R), despite the high attack complexity (AC:H). Successful exploitation allows full account takeover, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) with no change in scope (S:U).
Mitigation guidance and patches are detailed in the provided references, including the Teedy blog at https://blog.teedy.io/, analysis at https://github.com/samplev45/CVE-2025-22963, release notes for v1.11 at https://github.com/sismics/docs/releases/tag/v1.11, and a proof-of-concept at https://github.com/sota70/teedy-v1.11-csrf. Practitioners should consult these for upgrade paths beyond version 1.11.
Details
- CWE(s)