{"id":78561,"date":"2026-05-17T15:42:25","date_gmt":"2026-05-17T12:12:25","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2018-25334-zechat-1-5-cross-site-request-forgery-csrf-via-hashtag-parameter\/"},"modified":"2026-05-17T15:42:25","modified_gmt":"2026-05-17T12:12:25","slug":"cve-2018-25334-zechat-1-5-cross-site-request-forgery-csrf-via-hashtag-parameter","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2018-25334-zechat-1-5-cross-site-request-forgery-csrf-via-hashtag-parameter\/","title":{"rendered":"CVE-2018-25334 &#8211; Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter"},"content":{"rendered":"<p>CVE ID :CVE-2018-25334<\/p>\n<p>  Published : May 17, 2026, 12:12 p.m. | 45\u00a0minutes ago<\/p>\n<p>  Description :Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user&#8217;s information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload and bypass the CSRF protection, allowing for unauthorized changes to user data. This can be exploited by tricking a user into submitting a crafted form or by using a script to obtain and set the CSRF token.<\/p>\n<p>  Severity: 5.4 | MEDIUM<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2018-25334 Published : May 17, 2026, 12:12 p.m. | 45\u00a0minutes ago Description :Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user&#8217;s information by bypassing anti-CSRF protections. The application uses a CSRF token, but an attacker can use the hashtag parameter to inject an encoded payload &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78561","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78561"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78561\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}