Description
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.
INFO
Published Date :
2025-10-29T17:49:07.899Z
Last Modified :
2025-10-29T19:01:54.985Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-62797 vulnerability.
| Vendors | Products |
|---|---|
| Rathena |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62797.