Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token. | |
| Title | Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter | |
| First Time appeared |
Zechat Project
Zechat Project zechat |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:zechat_project:zechat:1.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Zechat Project
Zechat Project zechat |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-17T12:12:25.417Z
Reserved: 2026-05-17T11:51:56.261Z
Link: CVE-2018-25334
No data.
Status : Received
Published: 2026-05-17T13:16:45.097
Modified: 2026-05-17T13:16:45.097
Link: CVE-2018-25334
No data.
OpenCVE Enrichment
Updated: 2026-05-17T14:45:03Z
Weaknesses