Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12189: CWE-352 Cross-Site Request Forgery (CSRF) in breadbutter Bread & Butter: Gate content & Improve lead conversion in 60 seconds

0
Medium
VulnerabilityCVE-2025-12189cvecve-2025-12189cwe-352
Published: Fri Dec 05 2025 (12/05/2025, 05:31:27 UTC)
Source: CVE Database V5
Vendor/Project: breadbutter
Product: Bread & Butter: Gate content & Improve lead conversion in 60 seconds

Description

The Bread & Butter: Gate content + Capture leads + Collect first-party data + Nurture with Ai agents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.10.1321. This is due to missing or incorrect nonce validation on the uploadImage() function. This makes it possible for unauthenticated attackers to upload arbitrary files that make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/12/2025, 06:08:25 UTC

Technical Analysis

CVE-2025-12189 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Bread & Butter: Gate content & Improve lead conversion in 60 seconds WordPress plugin, which is widely used for content gating, lead capture, and AI-driven nurturing. The vulnerability exists due to missing or incorrect nonce validation in the uploadImage() function, a security mechanism designed to ensure that requests are legitimate and initiated by authenticated users. Because of this flaw, an unauthenticated attacker can craft a malicious request that, when an authenticated site administrator is tricked into clicking (e.g., via phishing or social engineering), causes the upload of arbitrary files to the server. This can lead to remote code execution (RCE) if the uploaded files are executable scripts or web shells. The vulnerability affects all plugin versions up to and including 7.10.1321. The CVSS 3.1 base score is 4.3, indicating a medium severity primarily due to the requirement of user interaction (an admin clicking a malicious link) and the absence of direct confidentiality or availability impact. No patches or known exploits are currently reported, but the risk remains significant given the potential for RCE. The vulnerability is classified under CWE-352, which covers CSRF attacks that exploit the trust a web application places in the user's browser. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is mandatory. This vulnerability highlights the importance of proper nonce implementation in WordPress plugins to prevent unauthorized actions.

Potential Impact

For European organizations, the impact of CVE-2025-12189 can be substantial, particularly for businesses relying heavily on WordPress for marketing, lead generation, and customer engagement. Exploitation could allow attackers to upload malicious files leading to remote code execution, potentially resulting in website defacement, data manipulation, or full server compromise. This undermines the integrity of the affected websites and could lead to reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. While confidentiality impact is rated low, the integrity risk and potential for further exploitation elevate the threat. Organizations with high administrative privileges exposed to phishing or social engineering are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation. However, the widespread use of WordPress and marketing plugins in Europe means that attackers could target multiple organizations, especially those with less mature security awareness or patch management practices.

Mitigation Recommendations

1. Monitor the vendor’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2. Until patches are released, implement Web Application Firewall (WAF) rules to detect and block suspicious uploadImage() requests or CSRF attack patterns targeting the plugin. 3. Enforce strict nonce validation in custom or extended plugin code to ensure all state-changing requests require valid nonces. 4. Educate site administrators and users with elevated privileges about the risks of phishing and social engineering, emphasizing caution when clicking on unsolicited links. 5. Limit administrative access to trusted networks or use multi-factor authentication (MFA) to reduce the risk of compromised credentials. 6. Regularly audit WordPress plugins and remove or replace those that are outdated or no longer maintained. 7. Implement file upload restrictions and scanning on the server to detect and block malicious files. 8. Employ security plugins that can detect anomalous behavior or unauthorized file uploads. These measures collectively reduce the likelihood of successful exploitation and limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T20:00:43.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327172f88dbe026c779922

Added to database: 12/5/2025, 5:45:22 AM

Last enriched: 12/12/2025, 6:08:25 AM

Last updated: 2/4/2026, 7:21:28 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats