Skip to content

Instantly share code, notes, and snippets.

@LockeTom
Last active October 21, 2025 01:56
Show Gist options
  • Select an option

  • Save LockeTom/77fb982a49dee956101810bbefa09fb4 to your computer and use it in GitHub Desktop.

Select an option

Save LockeTom/77fb982a49dee956101810bbefa09fb4 to your computer and use it in GitHub Desktop.
CVE-2025-60645.md

CVE-2025-60645:A Cross-Site Request Forgery (CSRF)

1、描述(Description)

xxl-api v1.3.0及以下版本,增加、删除、修改等接口允许使用get方式请求,存在跨站请求伪造漏洞,以下仅展示用户管理模块中新增用户的接口的漏洞利用,其余接口均可参照此步骤复现(In xxl-api v1.3.0 and earlier versions, interfaces for adding, deleting, and modifying allow GET requests, which leads to cross-site request forgery vulnerabilities. The following only demonstrates the vulnerability exploitation of the interface for adding new users in the user management module. The same steps can be followed to reproduce the vulnerabilities in other interfaces.)

2、复现步骤(Steps to reproduce)

2.1、第一步(Step 1)

拉起最新的代码,本地部署运行。(Pull up the latest code and run it on-premises.)

2.2、第二步(Step 2)

使用burp代理用户管理模块新增用户的请求,并将该请求方法修改为get方法。(Use the burp proxy user management module to add a user's request and modify the request method to the get method.) image image image

2.3、第三步(Step 3)

使用burp工具生成csrf的poc(Use the burp tool to generate a POC for CSRF) image

2.4、第四步(Step 4)

在同一个浏览器内,访问Poc的链接(Within the same browser, access the link to the Poc) image image

2.5、第五步(Step 4)

查看用户管理模块,发现已新增账号名称为testcsrf的用户(Check the User Management module and find that the user with the account name testcsrf has been added) image

3、漏洞分析(Vulnerability analysis)

接口中使用@RequestMapping注解,且未指定具体的请求方法,导致攻击者可使用get方法来调用接口(In the interface, the @RequestMapping annotation is used without specifying a specific request method, which allows attackers to invoke the interface using the GET method.) image

4、产品(Product)

https://github.com/xuxueli/xxl-api

5、版本(Versions)

xxl-api ≤ v1.3.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment