Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10311: CWE-352 Cross-Site Request Forgery (CSRF) in tom_riddle Comment Info Detector

0
Medium
VulnerabilityCVE-2025-10311cvecve-2025-10311cwe-352
Published: Fri Oct 03 2025 (10/03/2025, 11:17:07 UTC)
Source: CVE Database V5
Vendor/Project: tom_riddle
Product: Comment Info Detector

Description

The Comment Info Detector plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing nonce validation on the options.php file when handling form submissions. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 10/03/2025, 11:33:19 UTC

Technical Analysis

CVE-2025-10311 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Comment Info Detector plugin for WordPress, developed by tom_riddle. This vulnerability exists in all versions up to and including 1.0.5. The root cause is the absence of nonce validation on the options.php file during form submissions, which is a critical security control to ensure that requests originate from legitimate users and not from malicious third-party sites. Because of this missing validation, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify the plugin’s settings without the administrator’s consent. The vulnerability does not allow direct compromise of confidentiality or availability but can lead to integrity issues by altering plugin configurations, potentially weakening site security or enabling further attacks. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking a link). No known exploits are currently in the wild, and no patches have been published yet. This vulnerability highlights the importance of nonce validation in WordPress plugins to prevent CSRF attacks, which can be leveraged to manipulate site behavior indirectly through trusted users.

Potential Impact

For European organizations using WordPress sites with the vulnerable Comment Info Detector plugin, this vulnerability poses a moderate risk. While it does not directly expose sensitive data or cause denial of service, unauthorized modification of plugin settings can degrade the security posture of the website. Attackers could potentially alter configurations to disable security features, enable malicious logging, or create conditions favorable for further exploitation. This could lead to reputational damage, especially for organizations relying on their websites for customer engagement or e-commerce. Additionally, regulatory frameworks such as GDPR emphasize the protection of integrity and security of personal data processing systems; a compromised website configuration could indirectly lead to non-compliance if it results in data breaches or unauthorized data manipulation. The requirement for user interaction (administrator clicking a malicious link) somewhat limits the exploitability but does not eliminate risk, especially in environments where phishing attacks are prevalent. Organizations with multiple WordPress administrators or less security-aware staff are at higher risk.

Mitigation Recommendations

1. Immediate mitigation should include educating WordPress administrators about the risk of clicking untrusted links and implementing strict email and web filtering to reduce phishing attempts. 2. Administrators should monitor plugin settings for unauthorized changes and maintain regular backups of site configurations to enable quick restoration. 3. Developers and site maintainers should implement nonce validation on all form submissions, particularly in options.php, to ensure requests are legitimate. 4. Until an official patch is released, consider disabling or removing the Comment Info Detector plugin if it is not essential, or restrict administrative access to trusted networks and users only. 5. Employ Content Security Policy (CSP) and SameSite cookie attributes to reduce the risk of CSRF attacks. 6. Regularly update WordPress core and plugins to their latest versions and subscribe to vulnerability advisories for timely patching. 7. Use web application firewalls (WAFs) that can detect and block suspicious CSRF attempts targeting known vulnerable endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T23:18:37.817Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dfb274c3835a5fbe033bdd

Added to database: 10/3/2025, 11:24:36 AM

Last enriched: 10/3/2025, 11:33:19 AM

Last updated: 10/7/2025, 12:01:00 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats