Pega continually works to implement security controls designed to protect client environments. With this focus, Pega has issued patch releases/hotfixes for 1 High security vulnerability in Pega Platform.
|
Advisory |
Description |
Impact |
Hotfix Remediation |
Patch Remediation |
|---|---|---|---|---|
|
F25 |
Cross Site Request Forgery (CSRF) |
CSRF is an attack that tricks the victim into submitting a malicious request. Pega Platform provides CSRF protection when activated through the dedicated CSRF landing page. Through URL manipulation, CSRF protection, when activated, could be bypassed for update actions. |
8.8.1 Hotfix** 8.8.5 Hotfix 23.1.4 Hotfix 24.1.3 Hotfix 24.2.1 Hotfix 24.2.2 Hotfix |
24.1.4 Patch Release 24.2.3 Patch Release 25.1.0 Release |
** - provided as a courtesy for the clients who reported the issue.
We are not aware of any of our clients being compromised as a result of this vulnerability.
The remediation of this issue will be included as part of the product in the patch releases of the Pega Platform listed above.
How to obtain your hotfix
If you are a Pega Cloud® client, your Pega Cloud environments, running the relevant Pega versions listed in the table below, are being proactively remediated by Pega. Cloud Maintenance (CM) cases are being created for each of your environments and will provide the schedule of when the hotfixes will be applied. If you are not on a version with a solution provided, you need to upgrade as soon as possible.
If you are a United States Pega Cloud for Government (PCFG) client, Cloud Change (CC) cases are being created, for the relevant hotfix, which will be applied by Pega. If you are not on a version with a solution provided, you need to upgrade as soon as possible.
If you are an on–premises or client managed cloud client, please review the table below to determine which hotfixes correspond to your Pega installation. Once you have determined the appropriate hotfix IDs, download your hotfix directly from My Security Hotfixes on My Pega.
Information regarding the availability of the hotfixes will be publicly posted on Pega Support Center on Nov. 4th, 2025. Please do not discuss this in public forums until after it’s been publicly posted.
As always, we recommend our clients review our Security Checklist regularly.
Hotfixes
Hotfixes are only being created for the patch releases listed above under Hotfix Remediation. We will not provide hotfixes on prior versions of the platform.
As a best practice, you should update your Pega environment to the latest release to take advantage of the latest features, capabilities, security and bug fixes. See Keeping current with Pega.
|
Version |
Hotfix |
|---|---|
|
8.8.1 |
HFIX-C1102** |
|
8.8.5 |
HFIX-C1598 |
|
23.1.4 |
HFIX-C1595 |
|
24.1.3 |
HFIX-C1596 |
|
24.2.1 |
HFIX-C1514 |
|
24.2.2 |
HFIX-C1597 |
** - provided as a courtesy for the client who reported the issue
A restart is needed after installing the hotfix.
Dates for upcoming patch releases can be found here: Pega Infinity Patch Calendar.
Issue Details
|
Issue Details |
Cross Script Request Forgery (CSRF) for Non-Ajax GET requests |
|---|---|
|
Software/Product |
Pega Platform |
|
Affected Version(s) |
From 7.x to 24.2.2 |
|
CVE ID |
No CVE |
|
CVSS Rating |
High – 7.5 |
|
Description |
Cross Script Request Forgery (CSRF) for Non-Ajax Get GET requests |
If you have any questions or concerns, please raise a Support ticket with Global Client Support in My Support Portal for assistance.