CVE-2025-10375: CWE-352 Cross-Site Request Forgery (CSRF) in accessibewp Web Accessibility by accessiBe
The Web Accessibility By accessiBe plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.10. This is due to missing nonce validation on multiple AJAX actions including accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. This makes it possible for unauthenticated attackers to modify plugin settings and create verification files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-10375 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Web Accessibility by accessiBe plugin for WordPress, affecting all versions up to and including 2.10. The root cause is the absence of nonce validation on several AJAX endpoints such as accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. Nonce tokens are security measures designed to ensure that requests originate from legitimate users and not from forged sources. Without this validation, attackers can craft malicious web pages or emails that, when visited or clicked by an authenticated site administrator, cause the administrator's browser to perform unauthorized actions on the vulnerable WordPress site. These actions include modifying plugin configurations and creating verification files, potentially undermining site integrity and security posture. The vulnerability does not require the attacker to be authenticated but does require the administrator's interaction, such as clicking a crafted link. The CVSS 3.1 base score of 4.3 reflects a medium severity level, with network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was published on October 11, 2025, and assigned by Wordfence. This issue is categorized under CWE-352, which covers CSRF vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the Web Accessibility by accessiBe plugin. Unauthorized modification of plugin settings could disrupt accessibility features, potentially violating EU accessibility regulations such as the European Accessibility Act. Creation of verification files by attackers might be leveraged for further malicious activities, including site defacement or facilitating additional attacks. Although confidentiality and availability impacts are minimal, the integrity compromise could damage organizational reputation and compliance standing. Given the widespread use of WordPress across Europe and increasing emphasis on web accessibility compliance, organizations in sectors like government, education, and public services are particularly vulnerable. The requirement for administrator interaction means social engineering could be a vector, increasing the risk if phishing defenses are weak. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify use of the Web Accessibility by accessiBe plugin and verify the version in use. Until an official patch is released, administrators should implement the following mitigations: (1) Restrict administrator access and educate administrators about the risks of clicking unsolicited links or visiting untrusted websites while logged into WordPress. (2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable plugin endpoints. (3) Disable or restrict AJAX actions related to the plugin if feasible, especially those exposed without nonce validation. (4) Monitor logs for unusual configuration changes or verification file creations. (5) Consider temporarily deactivating the plugin if accessibility compliance can be maintained through alternative means. (6) Stay updated with vendor communications for official patches and apply them promptly once available. (7) Enhance phishing awareness training to reduce the risk of administrator interaction with malicious content. These steps go beyond generic advice by focusing on immediate risk reduction through access control, monitoring, and WAF rule tuning.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-10375: CWE-352 Cross-Site Request Forgery (CSRF) in accessibewp Web Accessibility by accessiBe
Description
The Web Accessibility By accessiBe plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.10. This is due to missing nonce validation on multiple AJAX actions including accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. This makes it possible for unauthenticated attackers to modify plugin settings and create verification files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-10375 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Web Accessibility by accessiBe plugin for WordPress, affecting all versions up to and including 2.10. The root cause is the absence of nonce validation on several AJAX endpoints such as accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. Nonce tokens are security measures designed to ensure that requests originate from legitimate users and not from forged sources. Without this validation, attackers can craft malicious web pages or emails that, when visited or clicked by an authenticated site administrator, cause the administrator's browser to perform unauthorized actions on the vulnerable WordPress site. These actions include modifying plugin configurations and creating verification files, potentially undermining site integrity and security posture. The vulnerability does not require the attacker to be authenticated but does require the administrator's interaction, such as clicking a crafted link. The CVSS 3.1 base score of 4.3 reflects a medium severity level, with network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was published on October 11, 2025, and assigned by Wordfence. This issue is categorized under CWE-352, which covers CSRF vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the Web Accessibility by accessiBe plugin. Unauthorized modification of plugin settings could disrupt accessibility features, potentially violating EU accessibility regulations such as the European Accessibility Act. Creation of verification files by attackers might be leveraged for further malicious activities, including site defacement or facilitating additional attacks. Although confidentiality and availability impacts are minimal, the integrity compromise could damage organizational reputation and compliance standing. Given the widespread use of WordPress across Europe and increasing emphasis on web accessibility compliance, organizations in sectors like government, education, and public services are particularly vulnerable. The requirement for administrator interaction means social engineering could be a vector, increasing the risk if phishing defenses are weak. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify use of the Web Accessibility by accessiBe plugin and verify the version in use. Until an official patch is released, administrators should implement the following mitigations: (1) Restrict administrator access and educate administrators about the risks of clicking unsolicited links or visiting untrusted websites while logged into WordPress. (2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable plugin endpoints. (3) Disable or restrict AJAX actions related to the plugin if feasible, especially those exposed without nonce validation. (4) Monitor logs for unusual configuration changes or verification file creations. (5) Consider temporarily deactivating the plugin if accessibility compliance can be maintained through alternative means. (6) Stay updated with vendor communications for official patches and apply them promptly once available. (7) Enhance phishing awareness training to reduce the risk of administrator interaction with malicious content. These steps go beyond generic advice by focusing on immediate risk reduction through access control, monitoring, and WAF rule tuning.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-12T15:42:42.324Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ea263d5baaa01f1ca0ff91
Added to database: 10/11/2025, 9:41:17 AM
Last enriched: 10/19/2025, 12:50:46 AM
Last updated: 12/4/2025, 6:08:58 AM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumNation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.