The send_message.php endpoint in SourceCodester Simple Public Chat Room 1.0 is vulnerable to Cross-Site Request Forgery (CSRF). The application does not implement any CSRF-protection mechanisms such as tokens, nonces, or same-site cookie restrictions. An attacker can create a malicious HTML page that, when visited by an authenticated user, will automatically submit a forged POST request to the vulnerable endpoint. This request will be executed with the victim's privileges, allowing the attacker to perform unauthorized actions on their behalf, such as sending arbitrary messages in any chat room.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The send_message.php endpoint in SourceCodester Simple Public Chat Room 1.0 is vulnerable to Cross-Site Request Forgery (CSRF). The application does not implement any CSRF-protection mechanisms such as tokens, nonces, or same-site cookie restrictions. An attacker can create a malicious HTML page that, when visited by an authenticated user, will automatically submit a forged POST request to the vulnerable endpoint. This request will be executed with the victim's privileges, allowing the attacker to perform unauthorized actions on their behalf, such as sending arbitrary messages in any chat room. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-10T00:00:00.000Z
Updated: 2025-11-10T14:37:19.918Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63710
No data.
Status : Received
Published: 2025-11-10T15:15:37.920
Modified: 2025-11-10T15:15:37.920
Link: CVE-2025-63710
No data.