Home

Description

FaceSentry Access Control System 6.4.8 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to change administrator passwords, add new admin users, or open access control doors by tricking authenticated users into loading a specially crafted webpage.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

6.4.8
affected

5.7.2
affected

5.7.0
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5524.php exploit

www.exploit-db.com/exploits/47065 (ExploitDB-47065) exploit

www.iwt.com.hk (Vendor Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5524.php (Zero Science Lab Disclosure (ZSL-2019-5524)) third-party-advisory

cve.org (CVE-2019-25242)

nvd.nist.gov (CVE-2019-25242)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.