CVE-2025-8223

A vulnerability, which was classified as problematic, was found in jerryshensjf JPACookieShop 蛋糕商城JPA版 up to 24a15c02b4f75042c9f7f615a3fed2ec1cefb999. This affects an unknown part of the file AdminTypeCustController.java. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
References
Link Resource
https://github.com/Bemcliu/cve-reports/blob/main/cve-06-%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88-CSRF/readme.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.317811 Permissions Required VDB Entry
https://vuldb.com/?id.317811 Third Party Advisory VDB Entry
https://vuldb.com/?submit.621787 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:jerryshensjf:jpacookieshop:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-27 05:15

Updated : 2025-10-31 19:19


NVD link : CVE-2025-8223

Mitre link : CVE-2025-8223

CVE.ORG link : CVE-2025-8223


JSON object : View

Products Affected

jerryshensjf

  • jpacookieshop
CWE
CWE-352

Cross-Site Request Forgery (CSRF)

CWE-862

Missing Authorization