CVE-2025-0990: CWE-352 Cross-Site Request Forgery (CSRF) in webtroniclabs I Am Gloria
CVE-2025-0990 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 1. 1. 4 of the I Am Gloria WordPress plugin by webtroniclabs. The vulnerability arises from missing or incorrect nonce validation in the iamgloria23_gloria_settings_page function, allowing unauthenticated attackers to trick site administrators into resetting the tenant ID via forged requests. Exploitation requires user interaction, specifically that an administrator clicks a malicious link. While no known exploits are currently in the wild, successful exploitation could lead to integrity loss by unauthorized modification of plugin settings. The vulnerability has a CVSS 3. 1 base score of 4. 3, reflecting low complexity but limited impact scope. Organizations using this plugin should prioritize applying patches or implementing nonce validation to prevent unauthorized state changes.
AI Analysis
Technical Summary
CVE-2025-0990 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the I Am Gloria plugin for WordPress, affecting all versions up to and including 1.1.4. The root cause is the absence or incorrect implementation of nonce validation in the iamgloria23_gloria_settings_page function, which is responsible for handling certain plugin settings, including the tenant ID. Nonces in WordPress are security tokens designed to verify that requests originate from legitimate users and prevent unauthorized actions. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), causes the plugin to reset the tenant ID. This unauthorized change compromises the integrity of the plugin’s configuration. The vulnerability does not allow for direct data disclosure or denial of service but can lead to unauthorized configuration changes that may affect plugin behavior or multi-tenant setups. The CVSS 3.1 score of 4.3 reflects that the attack vector is network-based, requires no privileges, but does require user interaction (an administrator clicking a link). The scope remains unchanged as the vulnerability affects only the plugin’s internal settings. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The absence of a patch link suggests that users should monitor vendor updates or apply manual mitigations.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the I Am Gloria plugin. An attacker can cause unauthorized changes to the tenant ID, potentially disrupting multi-tenant configurations or causing misrouting of data or functionality within the plugin. While it does not directly expose sensitive data or cause denial of service, unauthorized configuration changes can lead to operational issues, misconfigurations, or indirect security risks if tenant isolation is compromised. For organizations relying on this plugin for critical functionality, such changes could affect business processes or user experience. Since exploitation requires an administrator to interact with a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with less vigilant administrators. The vulnerability could be leveraged as part of a broader attack chain, especially in environments where tenant ID integrity is critical. Overall, the impact is moderate but should not be underestimated in high-value or multi-tenant WordPress deployments.
Mitigation Recommendations
To mitigate CVE-2025-0990, organizations should first check for and apply any official patches or updates from webtroniclabs as they become available. In the absence of an official patch, administrators can implement manual nonce validation in the iamgloria23_gloria_settings_page function by verifying WordPress nonces before processing any state-changing requests. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received from untrusted sources. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can reduce the risk of CSRF attacks by restricting cross-origin requests. Monitoring administrative actions and enabling logging for plugin configuration changes can help detect suspicious activity. Restricting administrative access to trusted networks or VPNs can further reduce exposure. Finally, consider disabling or replacing the I Am Gloria plugin if it is not essential or if a secure alternative exists.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2025-0990: CWE-352 Cross-Site Request Forgery (CSRF) in webtroniclabs I Am Gloria
Description
CVE-2025-0990 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 1. 1. 4 of the I Am Gloria WordPress plugin by webtroniclabs. The vulnerability arises from missing or incorrect nonce validation in the iamgloria23_gloria_settings_page function, allowing unauthenticated attackers to trick site administrators into resetting the tenant ID via forged requests. Exploitation requires user interaction, specifically that an administrator clicks a malicious link. While no known exploits are currently in the wild, successful exploitation could lead to integrity loss by unauthorized modification of plugin settings. The vulnerability has a CVSS 3. 1 base score of 4. 3, reflecting low complexity but limited impact scope. Organizations using this plugin should prioritize applying patches or implementing nonce validation to prevent unauthorized state changes.
AI-Powered Analysis
Technical Analysis
CVE-2025-0990 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the I Am Gloria plugin for WordPress, affecting all versions up to and including 1.1.4. The root cause is the absence or incorrect implementation of nonce validation in the iamgloria23_gloria_settings_page function, which is responsible for handling certain plugin settings, including the tenant ID. Nonces in WordPress are security tokens designed to verify that requests originate from legitimate users and prevent unauthorized actions. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), causes the plugin to reset the tenant ID. This unauthorized change compromises the integrity of the plugin’s configuration. The vulnerability does not allow for direct data disclosure or denial of service but can lead to unauthorized configuration changes that may affect plugin behavior or multi-tenant setups. The CVSS 3.1 score of 4.3 reflects that the attack vector is network-based, requires no privileges, but does require user interaction (an administrator clicking a link). The scope remains unchanged as the vulnerability affects only the plugin’s internal settings. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The absence of a patch link suggests that users should monitor vendor updates or apply manual mitigations.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the I Am Gloria plugin. An attacker can cause unauthorized changes to the tenant ID, potentially disrupting multi-tenant configurations or causing misrouting of data or functionality within the plugin. While it does not directly expose sensitive data or cause denial of service, unauthorized configuration changes can lead to operational issues, misconfigurations, or indirect security risks if tenant isolation is compromised. For organizations relying on this plugin for critical functionality, such changes could affect business processes or user experience. Since exploitation requires an administrator to interact with a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with less vigilant administrators. The vulnerability could be leveraged as part of a broader attack chain, especially in environments where tenant ID integrity is critical. Overall, the impact is moderate but should not be underestimated in high-value or multi-tenant WordPress deployments.
Mitigation Recommendations
To mitigate CVE-2025-0990, organizations should first check for and apply any official patches or updates from webtroniclabs as they become available. In the absence of an official patch, administrators can implement manual nonce validation in the iamgloria23_gloria_settings_page function by verifying WordPress nonces before processing any state-changing requests. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received from untrusted sources. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can reduce the risk of CSRF attacks by restricting cross-origin requests. Monitoring administrative actions and enabling logging for plugin configuration changes can help detect suspicious activity. Restricting administrative access to trusted networks or VPNs can further reduce exposure. Finally, consider disabling or replacing the I Am Gloria plugin if it is not essential or if a secure alternative exists.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-03T17:39:54.073Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6eb7ef31ef0b55562d
Added to database: 2/25/2026, 9:36:46 PM
Last enriched: 2/26/2026, 12:00:34 AM
Last updated: 2/26/2026, 7:04:55 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.