Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0796: CWE-352 Cross-Site Request Forgery (CSRF) in kevin-brent Mortgage Lead Capture System

0
Medium
VulnerabilityCVE-2025-0796cvecve-2025-0796cwe-352
Published: Tue Feb 18 2025 (02/18/2025, 04:21:13 UTC)
Source: CVE Database V5
Vendor/Project: kevin-brent
Product: Mortgage Lead Capture System

Description

CVE-2025-0796 is a Cross-Site Request Forgery (CSRF) vulnerability in the kevin-brent Mortgage Lead Capture System WordPress plugin, affecting all versions up to 8. 2. 10. The flaw arises from missing or incorrect nonce validation on the 'wprequal_reset_defaults' action, allowing unauthenticated attackers to reset plugin settings if they can trick an administrator into clicking a malicious link. This vulnerability does not impact confidentiality or availability but can alter the integrity of plugin settings. Exploitation requires user interaction but no authentication, making it a medium severity risk with a CVSS score of 4. 3. No known exploits are currently in the wild, and no patches have been published yet. Organizations using this plugin should be vigilant and implement mitigations to prevent unauthorized configuration changes. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries with widespread WordPress adoption and significant real estate or mortgage industries.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:55:38 UTC

Technical Analysis

The vulnerability identified as CVE-2025-0796 affects the Mortgage Lead Capture System plugin for WordPress, developed by kevin-brent. This plugin is widely used to capture mortgage leads via WordPress websites. The issue is a Cross-Site Request Forgery (CSRF) vulnerability categorized under CWE-352, which occurs because the plugin fails to properly validate nonces on the 'wprequal_reset_defaults' action. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to this missing or incorrect nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), resets the plugin’s settings without the administrator’s consent. This attack does not require the attacker to be authenticated themselves, only that they trick an admin user into performing the action. The impact is limited to integrity, as attackers can alter plugin configuration but cannot directly access or disrupt data confidentiality or availability. The CVSS v3.1 base score is 4.3, reflecting low complexity and no privileges required, but user interaction is necessary. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects all plugin versions up to and including 8.2.10. Organizations using this plugin should prioritize mitigation to prevent unauthorized configuration changes that could lead to further exploitation or operational issues.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of the Mortgage Lead Capture System plugin’s settings, which compromises the integrity of the plugin’s configuration. While this does not directly expose sensitive data or cause denial of service, altered settings could disrupt lead capture functionality, degrade user experience, or potentially open avenues for further attacks if the plugin’s altered state weakens other security controls. For organizations relying on this plugin to generate mortgage leads, such disruptions could result in lost business opportunities and reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, the attack vector is social engineering combined with CSRF. The vulnerability’s medium severity reflects its limited scope but non-negligible risk, especially for high-traffic WordPress sites in the real estate and mortgage sectors. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Organizations globally that use WordPress and this plugin are at risk, particularly those with administrative users who may be targeted via phishing or other social engineering tactics.

Mitigation Recommendations

1. Immediately restrict administrative access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Educate all WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 3. Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the 'wprequal_reset_defaults' action. 4. Monitor WordPress logs and plugin settings for unexpected changes, enabling rapid detection and response to unauthorized resets. 5. Until an official patch is released, consider temporarily disabling or removing the Mortgage Lead Capture System plugin if feasible, or restrict its usage to environments with minimal exposure. 6. Follow the vendor’s updates closely and apply patches promptly once available. 7. Review and harden nonce validation and CSRF protections in custom or third-party WordPress plugins as a best practice to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-28T14:40:20.184Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6bb7ef31ef0b55539c

Added to database: 2/25/2026, 9:36:43 PM

Last enriched: 2/25/2026, 11:55:38 PM

Last updated: 2/26/2026, 7:06:43 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats