CVE-2025-65573
Published: 09 December 2025
Summary
CVE-2025-65573 is a high-severity CSRF (CWE-352) vulnerability in Allskyteam Allsky. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SC-5 (Denial-of-service Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 directly requires mechanisms to authenticate session identifiers and protect against cross-site request forgery (CSRF) attacks like the one in handle_interface_POST_and_status.
SI-10 mandates validation of information inputs, including anti-CSRF tokens in POST requests to the vulnerable function, blocking forged requests.
SC-5 limits the effects of denial-of-service attacks triggered by exploitation of the CSRF vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-65573 is a CSRF vulnerability in a web application (AllSky), enabling remote exploitation of a public-facing application to perform unauthorized POST requests leading to denial of service.
NVD Description
Cross Site Request Forgery (CSRF) vulnerability in AllskyTeam AllSky v2024.12.06_06 allows remote attackers to cause a denial of service via function handle_interface_POST_and_status.
Deeper analysisAI
CVE-2025-65573 is a Cross Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in AllskyTeam AllSky version v2024.12.06_06. The flaw affects the function handle_interface_POST_and_status, enabling remote attackers to cause a denial of service. Published on 2025-12-09, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, no required privileges, and user interaction needed.
Remote attackers can exploit this CSRF vulnerability by crafting malicious web pages or requests that trick authenticated users into submitting unintended POST requests to the vulnerable handle_interface_POST_and_status function. No prior authentication or privileges are needed on the attacker's part, but the target user must interact (e.g., visit a malicious site) while logged into an affected AllSky instance, resulting in denial of service as described.
Mitigation details and further analysis are available in the primary advisory at https://gh0stmezh.wordpress.com/2025/12/05/cve-2025-65573/ and the AllSky GitHub repository at https://github.com/AllskyTeam/allsky. Relevant source files include https://github.com/AllskyTeam/allsky/blob/master/html/includes/dashboard_LAN.php, https://github.com/AllskyTeam/allsky/blob/master/html/includes/dashboard_WLAN.php, and https://github.com/AllskyTeam/allsky/blob/master/html/includes/functions.php.
Details
- CWE(s)