VulnerabilitiesHIGH

RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered

Featured image for RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered
#CVE-2025-65027#RomM#XSS#CSRF#admin takeover

Original Reporting

EDExploit-DB

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

πŸ›‘οΈ
πŸ›‘οΈ VULNERABILITY DETAILSCVE-2025-65027CVSS: 7.5ACTIVELY EXPLOITED
CVE IDCVE-2025-65027
CVSS Score7.5 / 10 (High)
Severity RatingHigh
Affected ProductRomM < 4.4.1
VendorRomM
Vulnerability TypeXSS + CSRF
Attack VectorWeb
Attack ComplexityLow
Privileges RequiredUser (Viewer role sufficient)
User InteractionRequired (Victim must open link)
Actively ExploitedYes
Patch AvailableYes
Workaround Availableβ€”
🎯

Basically, a flaw in RomM lets attackers change admin passwords if they trick users into clicking a link.

Quick Summary

A critical vulnerability in RomM 4.4.0 allows attackers to take over admin accounts via XSS and CSRF. Users must update to version 4.4.1 to avoid risks. Stay safe!

The Flaw

RomM version 4.4.0 has a critical vulnerability identified as CVE-2025-65027. This flaw combines Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF), enabling attackers to take over admin accounts. The vulnerability arises from the ability to upload malicious files and reuse CSRF tokens, bypassing SameSite cookie protections.

What's at Risk

The vulnerability primarily affects users of RomM who have an authenticated account, even with a viewer role. If exploited, an attacker can change the password of an admin account, leading to unauthorized access and control over the application.

Patch Status

The vendor has released an update, RomM version 4.4.1, which addresses this vulnerability. Users are strongly advised to upgrade to this version to secure their accounts against potential exploits.

Immediate Actions

To protect yourself from this vulnerability, follow these steps:

  1. Update to RomM version 4.4.1 immediately.
  2. Monitor your account for any unauthorized changes.
  3. Educate users about the risks of clicking on unknown links, especially those that could lead to malicious file uploads.

Technical Details

The exploit requires the attacker to have an authenticated account on RomM. They can upload a malicious HTML file as their profile avatar, which contains a script that changes the admin's password when the link is accessed. Here’s a brief overview of how the attack works:

  • The attacker logs in and obtains their CSRF token.
  • They upload a crafted HTML file that executes a password change upon being opened by an admin user.
  • If successful, the attacker can gain full control over the admin account.

Conclusion

This vulnerability underscores the importance of keeping software up to date and being cautious with file uploads and links. Users of RomM should act quickly to mitigate the risks associated with this critical flaw.

πŸ” How to Check If You're Affected

  1. 1.Check for any unauthorized changes to admin accounts.
  2. 2.Review logs for suspicious file uploads.
  3. 3.Ensure all users are on the latest version of RomM.

🏒 Impacted Sectors

Technology

Pro Insight

πŸ”’ Pro insight: This vulnerability exemplifies the risks of inadequate CSRF protections in web applications, necessitating robust security practices.

Sources

Original Report

EDExploit-DB
Read Original

Related Pings

HIGHVulnerabilities

ZSH 5.9 Vulnerability - Remote Code Execution Exploit

A serious vulnerability in ZSH 5.9 allows remote code execution. This puts Linux systems at significant risk. Users are urged to update their software and monitor for suspicious activity.

Exploit-DBΒ·
HIGHVulnerabilities

Jumbo Website Manager - Remote Code Execution Vulnerability

A serious vulnerability in Jumbo Website Manager allows remote code execution, risking user data and server security. Organizations should take immediate steps to protect their systems.

Exploit-DBΒ·
HIGHVulnerabilities

GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw

A serious vulnerability in GPL Odorizers GPL750 could allow remote attackers to manipulate gas line odorant levels. Users are urged to update their systems immediately to mitigate risks.

CISA AdvisoriesΒ·
CRITICALVulnerabilities

Contemporary Controls BASC 20T - Critical Vulnerability Exposed

A critical vulnerability in the Contemporary Controls BASC 20T could allow attackers to manipulate PLC components. Users must act quickly to secure their systems against potential exploitation.

CISA AdvisoriesΒ·
HIGHVulnerabilities

Android Intent Redirection Vulnerability Exposes Millions

A severe vulnerability in EngageSDK risks sensitive data across millions of Android wallets. Developers must update their SDKs to protect users. This flaw highlights the importance of secure third-party integrations.

Microsoft Security BlogΒ·
HIGHVulnerabilities

Internet-Exposed ICS Devices Raise Security Risks

Exposed ICS devices using insecure protocols like Modbus raise serious security concerns. Critical sectors may face disruptions and sabotage. Urgent action is needed to secure these systems.

Security AffairsΒ·