The send_message.php endpoint in SourceCodester Simple Public Chat Room 1.0 is vulnerable to Cross-Site Request Forgery (CSRF). The application does not implement any CSRF-protection mechanisms such as tokens, nonces, or same-site cookie restrictions. An attacker can create a malicious HTML page that, when visited by an authenticated user, will automatically submit a forged POST request to the vulnerable endpoint. This request will be executed with the victim's privileges, allowing the attacker to perform unauthorized actions on their behalf, such as sending arbitrary messages in any chat room.
History

Mon, 10 Nov 2025 15:00:00 +0000

Type Values Removed Values Added
Description The send_message.php endpoint in SourceCodester Simple Public Chat Room 1.0 is vulnerable to Cross-Site Request Forgery (CSRF). The application does not implement any CSRF-protection mechanisms such as tokens, nonces, or same-site cookie restrictions. An attacker can create a malicious HTML page that, when visited by an authenticated user, will automatically submit a forged POST request to the vulnerable endpoint. This request will be executed with the victim's privileges, allowing the attacker to perform unauthorized actions on their behalf, such as sending arbitrary messages in any chat room.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-10T00:00:00.000Z

Updated: 2025-11-10T14:37:19.918Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63710

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-10T15:15:37.920

Modified: 2025-11-10T15:15:37.920

Link: CVE-2025-63710

cve-icon Redhat

No data.