VYPR
Medium severity4.3NVD Advisory· Published Nov 13, 2025· Updated Apr 29, 2026

CVE-2025-13119

CVE-2025-13119

Description

A flaw has been found in Fabian Ros/SourceCodester Simple E-Banking System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Simple E-Banking System 1.0 allows attackers to force authenticated users to withdraw funds without consent, leading to financial loss.

Vulnerability

Overview

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Simple E-Banking System version 1.0 by Fabian Ros. The flaw resides in the /minus.php script that handles withdrawal requests. The application fails to implement an anti-CSRF token, allowing an attacker to craft a malicious request that leverages the victim's active session [1].

Exploitation

An attacker can exploit this by tricking an authenticated user into visiting a specially crafted webpage. The page automatically submits a POST request to /minus.php with arbitrary withdrawal parameters. Since the browser automatically includes the user's session cookie, the server processes the request as legitimate, executing the withdrawal without the user's knowledge or consent [1].

Impact

Successful exploitation enables an attacker to force the victim to withdraw an arbitrary amount of money from their account, resulting in direct financial loss. The vulnerability poses a high risk to user funds, as the attacker can drain the account without any user interaction beyond visiting a malicious page [1].

Mitigation

As of the publication date, no official patch has been released. The vendor should implement anti-CSRF tokens for all state-changing requests, particularly the withdrawal endpoint. Users are advised to avoid clicking untrusted links while logged into the application and to monitor account activity for unauthorized transactions [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.