Description

FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.

INFO

Published Date :

2025-10-29T17:49:07.899Z

Last Modified :

2025-10-29T19:01:54.985Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-62797 vulnerability.

Vendors Products
Rathena
  • Fluxcp
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62797.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability