CVE-2025-47909

Hosts · Hosts Multiple Products

**A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in multiple products from Hosts, allowing a network attacker to perform unauthorized actions by manipulating trust.

Executive summary

A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in multiple products from Hosts, allowing a network attacker to perform unauthorized actions by manipulating trusted origin settings.

Vulnerability

The application improperly trusts HTTP origins derived from hostnames listed in its TrustedOrigins configuration. This allows a network-based Man-in-the-Middle (MitM) attacker to intercept traffic and forge requests on behalf of an authenticated user, leading to a Cross-Site Request Forgery (CSRF) attack.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. An attacker could exploit this flaw to trick an authenticated user, such as an administrator, into performing sensitive actions without their consent. This could lead to unauthorized configuration changes, data modification or deletion, or account compromise, severely impacting the integrity of the application.

Remediation

Immediate Action: Apply the security updates provided by the vendor immediately to correct the improper validation of trusted origins.

Proactive Monitoring: Monitor for unexpected or unauthorized configuration changes within the application. Review network logs for signs of MitM activity or suspicious traffic patterns.

Compensating Controls: Enforce HTTPS across the entire application and implement HSTS (HTTP Strict Transport Security) to mitigate the risk of MitM attacks that enable this vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The combination of a network MitM vector and CSRF presents a serious threat, particularly in untrusted network environments. Given the High severity rating, administrators must prioritize applying the vendor patch. Additionally, a defense-in-depth strategy including network security controls is strongly advised.