{"vulnerability": "CVE-2025-23113", "sightings": [{"uuid": "d72fde6e-af06-4892-8801-37c9a8f158e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfgbddvsid2g", "content": "", "creation_timestamp": "2025-01-10T22:43:31.685351Z"}, {"uuid": "44951d78-4c18-42ba-a782-0f394e20ef49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23113\n\ud83d\udd39 Description: An issue was discovered in REDCap 14.9.6. It has an action=myprojects&amp;logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T21:57:46.646723\n\ud83d\udd17 References:\n1. https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_XXX/README.md", "creation_timestamp": "2025-01-10T22:04:48.000000Z"}, {"uuid": "345c0646-a9d5-49ff-b164-6dac7c05989b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "seen", "source": "https://t.me/cvedetector/15006", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23113 - REDCap CSRF Logout Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23113 \nPublished : Jan. 10, 2025, 10:15 p.m. | 32\u00a0minutes ago \nDescription : An issue was discovered in REDCap 14.9.6. It has an action=myprojects&amp;logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T23:52:16.000000Z"}, {"uuid": "30380d39-744f-4879-bcd7-148d7741dc5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113806369662260579", "content": "", "creation_timestamp": "2025-01-10T22:16:29.167262Z"}, {"uuid": "4252bf7e-908e-4042-bcd3-bd5272e7fe4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23113", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfg7t6ou7p2k", "content": "", "creation_timestamp": "2025-01-10T22:16:30.353337Z"}]}