CVE-2025-71280

| EUVD-2025-209154 MEDIUM
2026-04-01 VulnCheck GHSA-mvm5-rv5r-322q
6.9
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
EUVD ID Assigned
Apr 01, 2026 - 01:15 euvd
EUVD-2025-209154
Analysis Generated
Apr 01, 2026 - 01:15 vuln.today
CVE Published
Apr 01, 2026 - 00:30 nvd
MEDIUM 6.9

Description

XenForo before 2.3.7 allows information disclosure via local account page caching on shared systems. On systems where multiple users share a browser or machine, cached account pages could expose sensitive user information to other local users.

Analysis

XenForo before version 2.3.7 exposes sensitive user account information through improper browser caching of account pages on shared systems. Local users with access to a shared machine or browser can retrieve cached account data belonging to other users who previously accessed XenForo, enabling unauthorized information disclosure without authentication. No public exploit code or active exploitation has been identified; remediation requires upgrading to XenForo 2.3.7 or later.

Technical Context

This vulnerability stems from inadequate cache control headers on account pages served by XenForo (CWE-200: Information Exposure). When multiple users share a single browser or computer, HTTP caching mechanisms retain sensitive account page responses in local browser caches or system-level cache storage. XenForo's account pages-which contain personal user data, settings, and potentially authentication tokens-were not properly marked with cache-control directives (such as no-store, no-cache, or private with appropriate max-age values) to prevent local storage on multi-user systems. The affected product is XenForo, a PHP-based forum and community platform, where all versions before 2.3.7 lack proper cache isolation for account-related endpoints.

Affected Products

XenForo versions prior to 2.3.7 are affected (CPE: cpe:2.3:a:xenforo:xenforo:*:*:*:*:*:*:*:*). This includes all releases of XenForo 2.0.x through 2.3.6, and likely XenForo 1.x series, though the vulnerability description and vendor advisory reference XenForo 2.3.7 as the corrective release. The vendor advisory is available at https://xenforo.com/community/threads/xenforo-2-3-7-released-includes-security-fixes.232121/.

Remediation

Upgrade XenForo to version 2.3.7 or later immediately. This version includes fixes for the account page caching vulnerability that add proper cache-control headers and potentially other cache handling improvements to prevent sensitive data leakage on shared systems. Administrators should review the full release notes at https://xenforo.com/community/threads/xenforo-2-3-7-released-includes-security-fixes.232121/ for any additional configuration or post-upgrade steps. As an interim mitigation on systems where multiple users share browser access, ensure that shared computers have browser cache clearing enabled at shutdown, or instruct users to manually clear browser cache and temporary files after each session.

Priority Score

35
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +34
POC: 0

Share

CVE-2025-71280 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy