CVE-2025-12189: CWE-352 Cross-Site Request Forgery (CSRF) in breadbutter Bread & Butter: Gate content & Improve lead conversion in 60 seconds
The Bread & Butter: Gate content + Capture leads + Collect first-party data + Nurture with Ai agents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.10.1321. This is due to missing or incorrect nonce validation on the uploadImage() function. This makes it possible for unauthenticated attackers to upload arbitrary files that make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-12189 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Bread & Butter: Gate content & Improve lead conversion in 60 seconds WordPress plugin, which is widely used for content gating, lead capture, and AI-driven nurturing. The vulnerability exists due to missing or incorrect nonce validation in the uploadImage() function, a security mechanism designed to ensure that requests are legitimate and initiated by authenticated users. Because of this flaw, an unauthenticated attacker can craft a malicious request that, when an authenticated site administrator is tricked into clicking (e.g., via phishing or social engineering), causes the upload of arbitrary files to the server. This can lead to remote code execution (RCE) if the uploaded files are executable scripts or web shells. The vulnerability affects all plugin versions up to and including 7.10.1321. The CVSS 3.1 base score is 4.3, indicating a medium severity primarily due to the requirement of user interaction (an admin clicking a malicious link) and the absence of direct confidentiality or availability impact. No patches or known exploits are currently reported, but the risk remains significant given the potential for RCE. The vulnerability is classified under CWE-352, which covers CSRF attacks that exploit the trust a web application places in the user's browser. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is mandatory. This vulnerability highlights the importance of proper nonce implementation in WordPress plugins to prevent unauthorized actions.
Potential Impact
For European organizations, the impact of CVE-2025-12189 can be substantial, particularly for businesses relying heavily on WordPress for marketing, lead generation, and customer engagement. Exploitation could allow attackers to upload malicious files leading to remote code execution, potentially resulting in website defacement, data manipulation, or full server compromise. This undermines the integrity of the affected websites and could lead to reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. While confidentiality impact is rated low, the integrity risk and potential for further exploitation elevate the threat. Organizations with high administrative privileges exposed to phishing or social engineering are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation. However, the widespread use of WordPress and marketing plugins in Europe means that attackers could target multiple organizations, especially those with less mature security awareness or patch management practices.
Mitigation Recommendations
1. Monitor the vendor’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2. Until patches are released, implement Web Application Firewall (WAF) rules to detect and block suspicious uploadImage() requests or CSRF attack patterns targeting the plugin. 3. Enforce strict nonce validation in custom or extended plugin code to ensure all state-changing requests require valid nonces. 4. Educate site administrators and users with elevated privileges about the risks of phishing and social engineering, emphasizing caution when clicking on unsolicited links. 5. Limit administrative access to trusted networks or use multi-factor authentication (MFA) to reduce the risk of compromised credentials. 6. Regularly audit WordPress plugins and remove or replace those that are outdated or no longer maintained. 7. Implement file upload restrictions and scanning on the server to detect and block malicious files. 8. Employ security plugins that can detect anomalous behavior or unauthorized file uploads. These measures collectively reduce the likelihood of successful exploitation and limit potential damage.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12189: CWE-352 Cross-Site Request Forgery (CSRF) in breadbutter Bread & Butter: Gate content & Improve lead conversion in 60 seconds
Description
The Bread & Butter: Gate content + Capture leads + Collect first-party data + Nurture with Ai agents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.10.1321. This is due to missing or incorrect nonce validation on the uploadImage() function. This makes it possible for unauthenticated attackers to upload arbitrary files that make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-12189 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Bread & Butter: Gate content & Improve lead conversion in 60 seconds WordPress plugin, which is widely used for content gating, lead capture, and AI-driven nurturing. The vulnerability exists due to missing or incorrect nonce validation in the uploadImage() function, a security mechanism designed to ensure that requests are legitimate and initiated by authenticated users. Because of this flaw, an unauthenticated attacker can craft a malicious request that, when an authenticated site administrator is tricked into clicking (e.g., via phishing or social engineering), causes the upload of arbitrary files to the server. This can lead to remote code execution (RCE) if the uploaded files are executable scripts or web shells. The vulnerability affects all plugin versions up to and including 7.10.1321. The CVSS 3.1 base score is 4.3, indicating a medium severity primarily due to the requirement of user interaction (an admin clicking a malicious link) and the absence of direct confidentiality or availability impact. No patches or known exploits are currently reported, but the risk remains significant given the potential for RCE. The vulnerability is classified under CWE-352, which covers CSRF attacks that exploit the trust a web application places in the user's browser. The attack vector is network-based, with low attack complexity and no privileges required, but user interaction is mandatory. This vulnerability highlights the importance of proper nonce implementation in WordPress plugins to prevent unauthorized actions.
Potential Impact
For European organizations, the impact of CVE-2025-12189 can be substantial, particularly for businesses relying heavily on WordPress for marketing, lead generation, and customer engagement. Exploitation could allow attackers to upload malicious files leading to remote code execution, potentially resulting in website defacement, data manipulation, or full server compromise. This undermines the integrity of the affected websites and could lead to reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. While confidentiality impact is rated low, the integrity risk and potential for further exploitation elevate the threat. Organizations with high administrative privileges exposed to phishing or social engineering are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation. However, the widespread use of WordPress and marketing plugins in Europe means that attackers could target multiple organizations, especially those with less mature security awareness or patch management practices.
Mitigation Recommendations
1. Monitor the vendor’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2. Until patches are released, implement Web Application Firewall (WAF) rules to detect and block suspicious uploadImage() requests or CSRF attack patterns targeting the plugin. 3. Enforce strict nonce validation in custom or extended plugin code to ensure all state-changing requests require valid nonces. 4. Educate site administrators and users with elevated privileges about the risks of phishing and social engineering, emphasizing caution when clicking on unsolicited links. 5. Limit administrative access to trusted networks or use multi-factor authentication (MFA) to reduce the risk of compromised credentials. 6. Regularly audit WordPress plugins and remove or replace those that are outdated or no longer maintained. 7. Implement file upload restrictions and scanning on the server to detect and block malicious files. 8. Employ security plugins that can detect anomalous behavior or unauthorized file uploads. These measures collectively reduce the likelihood of successful exploitation and limit potential damage.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T20:00:43.777Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c779922
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/12/2025, 6:08:25 AM
Last updated: 2/4/2026, 7:21:28 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.