HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

RomM 4.4.0 XSS + CSRF Chain Enables Admin Account Takeover (CVE‑2025‑65027)

A chained XSS and CSRF vulnerability (CVE‑2025‑65027) in RomM < 4.4.1 allows a viewer‑level account to upload a malicious avatar that, when opened by an admin, forces a password change and full account takeover. TPRM teams must verify versions, enforce least‑privilege, and audit CSRF controls.

LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

RomM 4.4.0 XSS + CSRF Chain Enables Admin Account Takeover (CVE‑2025‑65027)

What Happened — A chain of unrestricted file‑upload (XSS) and CSRF token‑reuse vulnerabilities (CVE‑2025‑65027) was disclosed for RomM < 4.4.1. An attacker with a low‑privilege “viewer” account can upload a malicious HTML avatar, then lure an admin to open it, forcing a password change and full account takeover.

Why It Matters for TPRM

  • Credential‑level compromise of a third‑party service can cascade to your environment.
  • The flaw exploits trusted‑user functionality, highlighting the risk of over‑privileged integrations.
  • Remediation may require patching, configuration changes, or replacing the vendor for critical workloads.

Who Is Affected — SaaS/self‑hosted media‑library platforms, gaming‑content providers, and any organization that integrates RomM for ROM management or internal media distribution.

Recommended Actions

  • Verify RomM version; upgrade to 4.4.1 or later immediately.
  • Enforce least‑privilege for user roles; restrict “viewer” accounts from file uploads.
  • Audit CSRF token handling and SameSite cookie settings.
  • Review logs for suspicious avatar uploads or password‑change API calls.

Technical Notes — The attack requires an authenticated low‑privilege account, leverages an unrestricted avatar upload (XSS) to host a malicious HTML file, and reuses the victim’s CSRF token to bypass SameSite protection, culminating in a PUT /api/users/1 request that resets the admin password. No public CVE‑2025‑65027 exploit code is required beyond the posted PoC. Source: Exploit‑DB 52505

📰 Original Source
https://www.exploit-db.com/exploits/52505

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.