CVE-2018-25334 PUBLISHED

Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter

Assigner: VulnCheck
Reserved: 17.05.2026 Published: 17.05.2026 Updated: 17.05.2026

Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor Bylancer
Product Zechat
Versions
  • Version 1.5 is affected

Credits

  • Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com finder

References

Problem Types

  • Cross-Site Request Forgery (CSRF) CWE