CVE-2025-62797

Source
https://cve.org/CVERecord?id=CVE-2025-62797
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62797.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62797
Aliases
  • GHSA-5w2g-8cqq-r4fr
Published
2025-10-29T17:49:07.899Z
Modified
2026-04-02T12:58:27.998612Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
CSRF in FluxCP account endpoints allows account takeover / state-changing actions
Details

FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62797.json",
    "cwe_ids": [
        "CWE-352"
    ]
}
References

Affected packages

Git / github.com/rathena/fluxcp

Affected ranges

Type
GIT
Repo
https://github.com/rathena/fluxcp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.3.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62797.json"