CVE-2025-63952

A Cross-Site Request Forgery (CSRF) in the /mwapi?method=add-user component of Magewell Pro Convert v1.2.213 allows attackers to arbitrarily create accounts via a crafted GET request.
References
Link Resource
https://github.com/iyadalkhatib98/My_CVES/tree/main/CVE-2025-63952 Exploit Third Party Advisory
https://www.magewell.com Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:magewell:pro_convert_hdmi_4k_plus_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_hdmi_4k_plus:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:magewell:pro_convert_hdmi_plus_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_hdmi_plus:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:magewell:pro_convert_hdmi_tx_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_hdmi_tx:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:magewell:pro_convert_12g_sdi_4k_plus_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_12g_sdi_4k_plus:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:magewell:pro_convert_sdi_4k_plus_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_sdi_4k_plus:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:magewell:pro_convert_sdi_plus_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_sdi_plus:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:magewell:pro_convert_sdi_tx_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_sdi_tx:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:magewell:pro_convert_for_ndi_to_hdmi_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_for_ndi_to_hdmi:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:magewell:pro_convert_for_ndi_to_hdmi_4k_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_for_ndi_to_hdmi_4k:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:magewell:pro_convert_for_ndi_to_aio_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_for_ndi_to_aio:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:magewell:pro_convert_for_ndi_to_sdi_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_for_ndi_to_sdi:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:magewell:pro_convert_aes67_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_aes67:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:magewell:pro_convert_audio_dx_firmware:1.2.213:*:*:*:*:*:*:*
cpe:2.3:h:magewell:pro_convert_audio_dx:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-24 17:16

Updated : 2025-12-30 18:13


NVD link : CVE-2025-63952

Mitre link : CVE-2025-63952

CVE.ORG link : CVE-2025-63952


JSON object : View

Products Affected

magewell

  • pro_convert_sdi_4k_plus_firmware
  • pro_convert_for_ndi_to_aio
  • pro_convert_12g_sdi_4k_plus
  • pro_convert_hdmi_4k_plus_firmware
  • pro_convert_sdi_tx
  • pro_convert_audio_dx
  • pro_convert_for_ndi_to_hdmi
  • pro_convert_hdmi_plus
  • pro_convert_for_ndi_to_hdmi_4k_firmware
  • pro_convert_hdmi_4k_plus
  • pro_convert_hdmi_plus_firmware
  • pro_convert_aes67_firmware
  • pro_convert_sdi_plus_firmware
  • pro_convert_for_ndi_to_hdmi_4k
  • pro_convert_for_ndi_to_hdmi_firmware
  • pro_convert_hdmi_tx_firmware
  • pro_convert_12g_sdi_4k_plus_firmware
  • pro_convert_audio_dx_firmware
  • pro_convert_sdi_plus
  • pro_convert_for_ndi_to_sdi
  • pro_convert_sdi_4k_plus
  • pro_convert_for_ndi_to_sdi_firmware
  • pro_convert_sdi_tx_firmware
  • pro_convert_hdmi_tx
  • pro_convert_for_ndi_to_aio_firmware
  • pro_convert_aes67
CWE
CWE-352

Cross-Site Request Forgery (CSRF)