๐Ÿ” CVE Alert

CVE-2018-25334

MEDIUM 5.4

Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.

CWE CWE-352
Vendor bylancer
Product zechat
Published May 17, 2026
Last Updated May 18, 2026
Stay Ahead of the Next One

Get instant alerts for bylancer zechat

Be the first to know when new medium vulnerabilities affecting bylancer zechat are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Bylancer / Zechat
1.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/44685 bylancer.com: https://bylancer.com vulncheck.com: https://www.vulncheck.com/advisories/zechat-cross-site-request-forgery-csrf-via-hashtag-parameter

Credits

Borna nematzadeh (L0RD) or [email protected]