The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Fixes

Solution

Customers are strongly advised to update to the newest version.


Workaround

No workaround given by the vendor.

History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Title CVE-2025-27454
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-07-03T13:16:05.545Z

Reserved: 2025-02-26T08:39:58.980Z

Link: CVE-2025-27454

cve-icon Vulnrichment

Updated: 2025-07-03T13:04:18.380Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-03T12:15:23.380

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-27454

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.