Description
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/rathena/FluxCP/security/advisories/GHSA-5w2g-8cqq-r4fr
Scores
CVSS v4
8.6
EPSS
0.0003
EPSS Percentile
7.6%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-352
Status
published
Products (1)
rathena/FluxCP
< e3f130c4a2ccd615a3ee2ee0302ecbfbd84747e6
Published
Oct 29, 2025
Tracked Since
Feb 18, 2026