A Cross-Site Request Forgery (CSRF) in the /usapi?method=add-user component of Magewell Pro Convert v1.2.213 allows attackers to arbitrarily create accounts via a crafted GET request.
References
| Link | Resource |
|---|---|
| https://github.com/iyadalkhatib98/My_CVES/tree/main/CVE-2025-63953 | Exploit Third Party Advisory Mitigation |
| https://www.magewell.com | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-24 17:16
Updated : 2025-12-30 17:58
NVD link : CVE-2025-63953
Mitre link : CVE-2025-63953
CVE.ORG link : CVE-2025-63953
JSON object : View
Products Affected
magewell
- ultra_encode_aio
- ultra_encode_sdi_plus
- ultra_encode_sdi_firmware
- ultra_encode_sdi_plus_firmware
- ultra_encode_sdi
- ultra_encode_hdmi_firmware
- ultra_encode_aio_firmware
- ultra_encode_hdmi
- ultra_encode_hdmi_plus
- ultra_encode_hdmi_plus_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
