INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h
Vulnerabilities

CVE-2026-25812

High
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the application enables credentialed CORS requests but does not implement any CSRF protection mechanis
CWE-352 — Weakness Type
Published: Feb 9, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the application enables credentialed CORS requests but does not implement any CSRF protection mechanism.

🤖 AI Executive Summary

PlaciPy 1.0.0 contains a critical CSRF vulnerability due to missing CSRF protection mechanisms combined with permissive CORS configuration allowing credentialed requests. This enables attackers to perform unauthorized actions on behalf of authenticated users in educational institutions. The vulnerability affects placement management systems used across Saudi universities and educational organizations.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 20:54
🇸🇦 Saudi Arabia Impact Assessment
High impact on Saudi educational sector including universities (KSU, KAUST, PNU, etc.) and technical colleges using PlaciPy for student placement management. Risk extends to HR departments managing recruitment processes. Potential for unauthorized modification of student placement records, job offers, and candidate information. Secondary impact on employers and recruitment agencies relying on the platform for hiring decisions.
🏢 Affected Saudi Sectors
Education - Universities and Technical Colleges Education - Student Placement Services Human Resources - Recruitment Departments Government - Educational Institutions Private Sector - Recruitment Agencies
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Upgrade PlaciPy to patched version immediately
2. Audit CORS configuration and restrict to specific trusted domains only
3. Review access logs for suspicious cross-origin requests
4. Notify all users to clear browser cache and re-authenticate

PATCHING GUIDANCE:
1. Apply vendor security patch for version 1.0.0
2. Test patch in staging environment before production deployment
3. Implement version pinning to prevent downgrade attacks

COMPENSATING CONTROLS (if patch delayed):
1. Implement WAF rules to block requests with missing/invalid CSRF tokens
2. Restrict CORS to same-origin only: Access-Control-Allow-Origin: self
3. Disable credentialed CORS requests: Access-Control-Allow-Credentials: false
4. Implement SameSite cookie attribute: SameSite=Strict
5. Add X-CSRF-Token validation on all state-changing operations

DETECTION RULES:
1. Monitor for POST/PUT/DELETE requests from different origins
2. Alert on missing Referer headers in state-changing requests
3. Track unusual placement record modifications from external sources
4. Log all CORS preflight requests and cross-origin access attempts
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. ترقية PlaciPy إلى الإصدار المصحح فوراً
2. مراجعة إعدادات CORS وتقييدها على النطاقات الموثوقة المحددة فقط
3. مراجعة سجلات الوصول للطلبات المريبة من مصادر خارجية
4. إخطار جميع المستخدمين بمسح ذاكرة التخزين المؤقت وإعادة المصادقة

إرشادات التصحيح:
1. تطبيق تصحيح الأمان من المورد للإصدار 1.0.0
2. اختبار التصحيح في بيئة الاختبار قبل النشر في الإنتاج
3. تنفيذ تثبيت الإصدار لمنع هجمات الانحدار

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ قواعد WAF لحجب الطلبات بدون رموز CSRF صحيحة
2. تقييد CORS على نفس المصدر فقط
3. تعطيل طلبات CORS المصرح بها
4. تنفيذ سمة ملف تعريف الارتباط SameSite=Strict
5. إضافة التحقق من X-CSRF-Token على جميع العمليات التي تغير الحالة

قواعد الكشف:
1. مراقبة طلبات POST/PUT/DELETE من مصادر مختلفة
2. التنبيه على الطلبات بدون رؤوس Referer
3. تتبع التعديلات غير العادية على سجلات التوظيف من مصادر خارجية
4. تسجيل جميع طلبات CORS preflight ومحاولات الوصول من مصادر خارجية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information security policies and procedures A.6.1.1 - Access control policy A.8.2.1 - User registration and access rights management A.13.1.1 - Information security incident management
🔵 SAMA CSF
ID.AC-1 - Access Control Policy PR.AC-1 - Identities and credentials are managed PR.AC-4 - Access rights are managed DE.CM-1 - The network is monitored for unauthorized connections
🟡 ISO 27001:2022
A.5.1.1 - Policies for information security A.6.1.1 - Information security roles and responsibilities A.8.2.1 - User registration and access rights A.8.2.3 - Management of privileged access rights A.13.1.1 - Information security incident management
📦 Affected Products / CPE 1 entries
prasklatechnology:placipy:1.0.0
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-352
EPSS0.02%
Exploit No
Patch ✓ Yes
Published 2026-02-09
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-352
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.