Description
A Cross-Site Request Forgery (CSRF) in the /mwapi?method=add-user component of Magewell Pro Convert v1.2.213 allows attackers to arbitrarily create accounts via a crafted GET request.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/iyadalkhatib98/My_CVES/tree/main/CVE-2025-63952
Vendor Advisory
https://www.magewell.com
Scores
CVSS v3
5.7
EPSS
0.0002
EPSS Percentile
4.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-352
Status
published
Products (13)
magewell/pro_convert_12g_sdi_4k_plus_firmware
1.2.213
magewell/pro_convert_aes67_firmware
1.2.213
magewell/pro_convert_audio_dx_firmware
1.2.213
magewell/pro_convert_for_ndi_to_aio_firmware
1.2.213
magewell/pro_convert_for_ndi_to_hdmi_4k_firmware
1.2.213
magewell/pro_convert_for_ndi_to_hdmi_firmware
1.2.213
magewell/pro_convert_for_ndi_to_sdi_firmware
1.2.213
magewell/pro_convert_hdmi_4k_plus_firmware
1.2.213
magewell/pro_convert_hdmi_plus_firmware
1.2.213
magewell/pro_convert_hdmi_tx_firmware
1.2.213
... and 3 more
Published
Nov 24, 2025
Tracked Since
Feb 18, 2026