POC详情: 475b87b53674d892eb332b95b7e75e2583745a0e

来源
关联漏洞
标题: N/A (CVE-2025-26206)
描述:在 sell done storefront v.1.0 中存在跨站请求伪造漏洞,远程攻击者可以通过利用 index.html 组件来提升权限。
介绍
# 🚨 CVE-2025-26206: Cross-Site Request Forgery (CSRF) in Sell Done Storefront v.1.0

![Security](https://img.shields.io/badge/Security-Vulnerability%20Research-red) 
![CVE](https://img.shields.io/badge/CVE-2025--26206-critical) 
![Responsible Disclosure](https://img.shields.io/badge/Disclosure-Responsible-brightgreen)

Welcome to the official repository documenting the discovery and details of **CVE-2025-26206**, a critical **Cross-Site Request Forgery (CSRF)** vulnerability in **Sell Done Storefront v.1.0**. Discovered by **B. Sibhi**, this vulnerability highlights the importance of robust web application security practices.

---

## 📄 Overview
This repository provides a detailed breakdown of the **CSRF vulnerability** identified in **Sell Done Storefront v.1.0**, which has been assigned the CVE ID **CVE-2025-26206**. The vulnerability allows a remote attacker to escalate privileges by exploiting the lack of CSRF protections in the application.

---

## 🔍 Vulnerability Details

| **Category**         | **Details**                                                                 |
|-----------------------|-----------------------------------------------------------------------------|
| **CVE ID**           | [CVE-2025-26206](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26206) |
| **Vulnerability Type**| Cross-Site Request Forgery (CSRF)                                           |
| **Affected Product** | Sell Done Storefront v.1.0                                                  |
| **Impact**           | Privilege Escalation                                                        |
| **Attack Vector**    | Remote                                                                      |
| **Discoverer**       | [B. Sibhi](https://github.com/xibhi)                                |

---

## 🛠️ Technical Description

The vulnerability exists due to the absence of **anti-CSRF tokens** in the Sell Done Storefront v.1.0 web application. This allows an attacker to craft malicious requests that can be executed by an authenticated user without their knowledge, leading to **privilege escalation**.

### Affected Code
The vulnerable code is located in the following file:
- [`index.html`](https://github.com/selldone/storefront/blob/main/index.html)

### How It Works
1. An attacker creates a malicious HTML form or script designed to perform a privileged action (e.g., changing user roles).
2. The attacker tricks an authenticated user into visiting a page containing the malicious form/script.
3. The user’s browser sends a request to the vulnerable application, executing the privileged action without the user’s consent.

---

## ⚠️ Impact
If exploited, this vulnerability could allow a remote attacker to:
- Escalate privileges and gain unauthorized access to sensitive functionalities.
- Perform actions on behalf of authenticated users without their knowledge.

---

## 🛡️ Remediation
The vendor has been notified, and the issue has been patched. To mitigate this vulnerability:
1. **Update** to the latest version of Sell Done Storefront.
2. **Implement anti-CSRF tokens** in all state-changing requests.
3. **Validate and sanitize** all user inputs to prevent similar vulnerabilities.

---

## 📚 References
- [CVE Mitre Entry](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26206)
- [Sell Done Storefront GitHub Repository](https://github.com/selldone/storefront)
- [OWASP CSRF Prevention Cheat Sheet](https://owasp.org/www-community/attacks/csrf)

---

## 📜 License
This repository is licensed under the [MIT License](LICENSE). Feel free to use the information provided here for educational or research purposes.

---

**Disclaimer**: This repository is intended for educational and informational purposes only. The discoverer is not responsible for any misuse of the information provided.3. The user's browser sends a request to the vulnerable application, executing the privileged action without the user's knowledge.

**Note**: A full PoC is not provided here to prevent misuse. Responsible disclosure practices have been followed.
文件快照

[4.0K] /data/pocs/475b87b53674d892eb332b95b7e75e2583745a0e └── [4.0K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。