Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10375: CWE-352 Cross-Site Request Forgery (CSRF) in accessibewp Web Accessibility by accessiBe

0
Medium
VulnerabilityCVE-2025-10375cvecve-2025-10375cwe-352
Published: Sat Oct 11 2025 (10/11/2025, 09:28:42 UTC)
Source: CVE Database V5
Vendor/Project: accessibewp
Product: Web Accessibility by accessiBe

Description

The Web Accessibility By accessiBe plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.10. This is due to missing nonce validation on multiple AJAX actions including accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. This makes it possible for unauthenticated attackers to modify plugin settings and create verification files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 10/11/2025, 10:00:00 UTC

Technical Analysis

CVE-2025-10375 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Web Accessibility by accessiBe plugin for WordPress, affecting all versions up to and including 2.10. The vulnerability stems from the absence of nonce validation on several AJAX endpoints, including accessibe_signup, accessibe_login, accessibe_license_trial, accessibe_modify_config, and accessibe_add_verification_page. Nonce tokens are security measures designed to ensure that requests to change state originate from legitimate users and not from malicious third parties. Without nonce validation, an attacker can craft malicious web pages or links that, when visited or clicked by an authenticated site administrator, execute unauthorized actions on the vulnerable WordPress site. These actions can include changing plugin configurations or creating verification files, which could be leveraged to bypass security controls or prepare for further attacks. The vulnerability does not require the attacker to be authenticated but does require that the administrator interacts with the malicious content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality and availability but a potential impact on integrity. No public exploits have been reported to date, but the vulnerability poses a risk to site integrity and trustworthiness. The plugin is widely used to ensure web accessibility compliance, making it a critical component for organizations aiming to meet legal accessibility standards.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modification of accessibility plugin settings, potentially disrupting compliance with EU accessibility directives such as the Web Accessibility Directive (Directive (EU) 2016/2102). Altered configurations or unauthorized verification files could undermine the reliability of accessibility features, exposing organizations to legal and reputational risks. While the vulnerability does not directly compromise sensitive data confidentiality or availability, the integrity of the website’s accessibility compliance is at risk. This could affect public sector websites and private companies required to maintain accessibility standards. Additionally, attackers might leverage the altered plugin state as a foothold for further attacks or to evade detection. The requirement for user interaction (administrator clicking a malicious link) means social engineering is a key factor, emphasizing the importance of user awareness. The impact is more pronounced in organizations with high reliance on WordPress and the accessiBe plugin for accessibility compliance, especially those with public-facing websites serving diverse user groups.

Mitigation Recommendations

Immediate mitigation should focus on updating the Web Accessibility by accessiBe plugin to a version that includes nonce validation once released by the vendor. Until a patch is available, administrators should restrict access to the WordPress admin dashboard to trusted networks and users, employing IP whitelisting or VPN access where possible. Implementing Content Security Policy (CSP) headers can reduce the risk of malicious external content triggering CSRF attacks. Administrators should be trained to recognize phishing attempts and avoid clicking suspicious links, especially when logged into administrative accounts. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable endpoints can provide a protective layer. Regular audits of plugin configurations and verification files should be conducted to detect unauthorized changes promptly. Finally, organizations should consider disabling or limiting the use of AJAX actions exposed without nonce validation until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-12T15:42:42.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea263d5baaa01f1ca0ff91

Added to database: 10/11/2025, 9:41:17 AM

Last enriched: 10/11/2025, 10:00:00 AM

Last updated: 10/15/2025, 4:43:26 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats