Home

Description

Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.

PUBLISHED Reserved 2026-05-17 | Published 2026-05-17 | Updated 2026-05-18 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

1.5
affected

Credits

Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com finder

References

www.exploit-db.com/exploits/44685 (ExploitDB-44685) exploit

bylancer.com (Official Product Homepage) product

www.vulncheck.com/...uest-forgery-csrf-via-hashtag-parameter (VulnCheck Advisory: Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter) third-party-advisory

cve.org (CVE-2018-25334)

nvd.nist.gov (CVE-2018-25334)

Download JSON