CVE-2018-25334
Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.
| CWE | CWE-352 |
| Vendor | bylancer |
| Product | zechat |
| Published | May 17, 2026 |
| Last Updated | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for bylancer zechat
Be the first to know when new medium vulnerabilities affecting bylancer zechat are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Bylancer / Zechat
1.5
References
Credits
Borna nematzadeh (L0RD) or [email protected]