Published:2025/12/17 Last Updated:2025/12/17
JVN#55745775
GROWI vulnerable to cross-site request forgery
Overview
GROWI provided by GROWI, Inc. contains a cross-site request forgery vulnerability.
Products Affected
- GROWI v7.3.3 and earlier
Description
GROWI provided by GROWI, Inc. contains the following vulnerability.
- Cross-site request forgery (CWE-352)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score 4.3
- CVE-2025-64700
Impact
If a user views a malicious page while logged in, the user may be tricked to do unintended operations.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following version to address this vulnerability.
- GROWI v7.3.4
Vendor Status
| Vendor | Status | Last Update | Vendor Notes |
|---|---|---|---|
| GROWI, Inc. | Vulnerable | 2025/12/17 | GROWI, Inc. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
GROWI, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and GROWI, Inc. coordinated under the Information Security Early Warning Partnership.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2025-64700 |
| JVN iPedia |
JVNDB-2025-000118 |