{"uuid": "44951d78-4c18-42ba-a782-0f394e20ef49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23113\n\ud83d\udd39 Description: An issue was discovered in REDCap 14.9.6. It has an action=myprojects&amp;logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T21:57:46.646723\n\ud83d\udd17 References:\n1. https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_XXX/README.md", "creation_timestamp": "2025-01-10T22:04:48.000000Z"}