Home

Description

Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.

PUBLISHED Reserved 2025-04-15 | Published 2025-10-27 | Updated 2025-10-27 | Assigner VulnCheck




HIGH: 7.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unaffected

Any version before 7.38.17
affected

Credits

Noa Tchoumak finder

References

www.wimi-teamwork.com/ product

www.wimi-teamwork.com/product-news/release-7-38/ release-notes patch

www.vulncheck.com/advisories/wimi-teamwork-csrf third-party-advisory

cve.org (CVE-2025-34133)

nvd.nist.gov (CVE-2025-34133)

Download JSON