CVE-2025-0796: CWE-352 Cross-Site Request Forgery (CSRF) in kevin-brent Mortgage Lead Capture System
CVE-2025-0796 is a Cross-Site Request Forgery (CSRF) vulnerability in the kevin-brent Mortgage Lead Capture System WordPress plugin, affecting all versions up to 8. 2. 10. The flaw arises from missing or incorrect nonce validation on the 'wprequal_reset_defaults' action, allowing unauthenticated attackers to reset plugin settings if they can trick an administrator into clicking a malicious link. This vulnerability does not impact confidentiality or availability but can alter the integrity of plugin settings. Exploitation requires user interaction but no authentication, making it a medium severity risk with a CVSS score of 4. 3. No known exploits are currently in the wild, and no patches have been published yet. Organizations using this plugin should be vigilant and implement mitigations to prevent unauthorized configuration changes. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries with widespread WordPress adoption and significant real estate or mortgage industries.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-0796 affects the Mortgage Lead Capture System plugin for WordPress, developed by kevin-brent. This plugin is widely used to capture mortgage leads via WordPress websites. The issue is a Cross-Site Request Forgery (CSRF) vulnerability categorized under CWE-352, which occurs because the plugin fails to properly validate nonces on the 'wprequal_reset_defaults' action. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to this missing or incorrect nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), resets the plugin’s settings without the administrator’s consent. This attack does not require the attacker to be authenticated themselves, only that they trick an admin user into performing the action. The impact is limited to integrity, as attackers can alter plugin configuration but cannot directly access or disrupt data confidentiality or availability. The CVSS v3.1 base score is 4.3, reflecting low complexity and no privileges required, but user interaction is necessary. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects all plugin versions up to and including 8.2.10. Organizations using this plugin should prioritize mitigation to prevent unauthorized configuration changes that could lead to further exploitation or operational issues.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of the Mortgage Lead Capture System plugin’s settings, which compromises the integrity of the plugin’s configuration. While this does not directly expose sensitive data or cause denial of service, altered settings could disrupt lead capture functionality, degrade user experience, or potentially open avenues for further attacks if the plugin’s altered state weakens other security controls. For organizations relying on this plugin to generate mortgage leads, such disruptions could result in lost business opportunities and reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, the attack vector is social engineering combined with CSRF. The vulnerability’s medium severity reflects its limited scope but non-negligible risk, especially for high-traffic WordPress sites in the real estate and mortgage sectors. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Organizations globally that use WordPress and this plugin are at risk, particularly those with administrative users who may be targeted via phishing or other social engineering tactics.
Mitigation Recommendations
1. Immediately restrict administrative access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Educate all WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 3. Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the 'wprequal_reset_defaults' action. 4. Monitor WordPress logs and plugin settings for unexpected changes, enabling rapid detection and response to unauthorized resets. 5. Until an official patch is released, consider temporarily disabling or removing the Mortgage Lead Capture System plugin if feasible, or restrict its usage to environments with minimal exposure. 6. Follow the vendor’s updates closely and apply patches promptly once available. 7. Review and harden nonce validation and CSRF protections in custom or third-party WordPress plugins as a best practice to prevent similar vulnerabilities.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Netherlands, India, South Africa, New Zealand
CVE-2025-0796: CWE-352 Cross-Site Request Forgery (CSRF) in kevin-brent Mortgage Lead Capture System
Description
CVE-2025-0796 is a Cross-Site Request Forgery (CSRF) vulnerability in the kevin-brent Mortgage Lead Capture System WordPress plugin, affecting all versions up to 8. 2. 10. The flaw arises from missing or incorrect nonce validation on the 'wprequal_reset_defaults' action, allowing unauthenticated attackers to reset plugin settings if they can trick an administrator into clicking a malicious link. This vulnerability does not impact confidentiality or availability but can alter the integrity of plugin settings. Exploitation requires user interaction but no authentication, making it a medium severity risk with a CVSS score of 4. 3. No known exploits are currently in the wild, and no patches have been published yet. Organizations using this plugin should be vigilant and implement mitigations to prevent unauthorized configuration changes. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries with widespread WordPress adoption and significant real estate or mortgage industries.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-0796 affects the Mortgage Lead Capture System plugin for WordPress, developed by kevin-brent. This plugin is widely used to capture mortgage leads via WordPress websites. The issue is a Cross-Site Request Forgery (CSRF) vulnerability categorized under CWE-352, which occurs because the plugin fails to properly validate nonces on the 'wprequal_reset_defaults' action. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to this missing or incorrect nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), resets the plugin’s settings without the administrator’s consent. This attack does not require the attacker to be authenticated themselves, only that they trick an admin user into performing the action. The impact is limited to integrity, as attackers can alter plugin configuration but cannot directly access or disrupt data confidentiality or availability. The CVSS v3.1 base score is 4.3, reflecting low complexity and no privileges required, but user interaction is necessary. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects all plugin versions up to and including 8.2.10. Organizations using this plugin should prioritize mitigation to prevent unauthorized configuration changes that could lead to further exploitation or operational issues.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of the Mortgage Lead Capture System plugin’s settings, which compromises the integrity of the plugin’s configuration. While this does not directly expose sensitive data or cause denial of service, altered settings could disrupt lead capture functionality, degrade user experience, or potentially open avenues for further attacks if the plugin’s altered state weakens other security controls. For organizations relying on this plugin to generate mortgage leads, such disruptions could result in lost business opportunities and reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, the attack vector is social engineering combined with CSRF. The vulnerability’s medium severity reflects its limited scope but non-negligible risk, especially for high-traffic WordPress sites in the real estate and mortgage sectors. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Organizations globally that use WordPress and this plugin are at risk, particularly those with administrative users who may be targeted via phishing or other social engineering tactics.
Mitigation Recommendations
1. Immediately restrict administrative access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Educate all WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 3. Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the 'wprequal_reset_defaults' action. 4. Monitor WordPress logs and plugin settings for unexpected changes, enabling rapid detection and response to unauthorized resets. 5. Until an official patch is released, consider temporarily disabling or removing the Mortgage Lead Capture System plugin if feasible, or restrict its usage to environments with minimal exposure. 6. Follow the vendor’s updates closely and apply patches promptly once available. 7. Review and harden nonce validation and CSRF protections in custom or third-party WordPress plugins as a best practice to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-28T14:40:20.184Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6bb7ef31ef0b55539c
Added to database: 2/25/2026, 9:36:43 PM
Last enriched: 2/25/2026, 11:55:38 PM
Last updated: 2/26/2026, 7:06:43 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.