{"id":"CVE-2025-62797","summary":"CSRF in FluxCP account endpoints allows account takeover / state-changing actions","details":"FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.","aliases":["GHSA-5w2g-8cqq-r4fr"],"modified":"2026-04-02T12:58:27.998612Z","published":"2025-10-29T17:49:07.899Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62797.json","cwe_ids":["CWE-352"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62797.json"},{"type":"ADVISORY","url":"https://github.com/rathena/FluxCP/security/advisories/GHSA-5w2g-8cqq-r4fr"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-62797"},{"type":"FIX","url":"https://github.com/rathena/FluxCP/commit/e3f130c4a2ccd615a3ee2ee0302ecbfbd84747e6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rathena/fluxcp","events":[{"introduced":"0"},{"fixed":"e3f130c4a2ccd615a3ee2ee0302ecbfbd84747e6"}]}],"versions":["v1.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62797.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"}]}