Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12189: CWE-352 Cross-Site Request Forgery (CSRF) in breadbutter Bread & Butter: Gate content & Improve lead conversion in 60 seconds

0
Medium
VulnerabilityCVE-2025-12189cvecve-2025-12189cwe-352
Published: Fri Dec 05 2025 (12/05/2025, 05:31:27 UTC)
Source: CVE Database V5
Vendor/Project: breadbutter
Product: Bread & Butter: Gate content & Improve lead conversion in 60 seconds

Description

The Bread & Butter: Gate content + Capture leads + Collect first-party data + Nurture with Ai agents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.10.1321. This is due to missing or incorrect nonce validation on the uploadImage() function. This makes it possible for unauthenticated attackers to upload arbitrary files that make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:04:07 UTC

Technical Analysis

CVE-2025-12189 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Bread & Butter: Gate content & Improve lead conversion in 60 seconds' developed by breadbutter. This vulnerability exists in all versions up to and including 7.10.1321 due to missing or incorrect nonce validation in the uploadImage() function. Nonce validation is a security mechanism designed to prevent unauthorized commands from being executed by ensuring that requests originate from legitimate users. The absence or improper implementation of this validation allows an attacker to craft a malicious request that, when performed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), results in the upload of arbitrary files to the server. These files could contain malicious code, potentially leading to remote code execution (RCE), which would allow the attacker to execute commands on the server with the privileges of the web server or the administrator. The vulnerability requires user interaction (UI:R) but no prior authentication (PR:N), making it a medium-severity risk with a CVSS score of 4.3. The attack vector is network-based (AV:N), and the impact affects integrity (I:L) but not confidentiality or availability. No patches or exploits are currently publicly available, but the risk remains significant due to the potential for privilege escalation and server compromise. The plugin is used primarily for gating content, capturing leads, and nurturing with AI agents, making it attractive for marketing and sales teams. The vulnerability highlights the importance of proper nonce implementation in WordPress plugins to prevent CSRF attacks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites using the affected WordPress plugin for marketing and lead generation purposes. Successful exploitation could lead to unauthorized file uploads and remote code execution, potentially compromising the web server and underlying infrastructure. This could result in data integrity issues, unauthorized access to sensitive marketing data, and disruption of lead capture processes. Additionally, attackers could leverage compromised servers to pivot into internal networks or deploy malware, impacting broader organizational security. Given the plugin's role in customer engagement, exploitation could damage brand reputation and customer trust. The medium severity score reflects the need for user interaction and the absence of direct confidentiality or availability impact, but the potential for remote code execution elevates the threat. Organizations with high web presence and reliance on WordPress plugins for business operations are particularly vulnerable. The lack of known exploits in the wild provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Monitor the vendor's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2. In the interim, disable or deactivate the 'Bread & Butter' plugin if feasible, especially on high-value or critical websites. 3. Implement strict nonce validation checks in the plugin's uploadImage() function if custom fixes are possible, ensuring all state-changing requests require valid nonces. 4. Educate site administrators and users about the risks of clicking on unsolicited links or visiting untrusted websites to reduce the chance of CSRF exploitation. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the uploadImage() endpoint. 6. Restrict file upload permissions and validate uploaded file types and contents to prevent execution of malicious code. 7. Regularly audit WordPress plugins for security best practices and consider alternatives with better security track records. 8. Maintain comprehensive backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T20:00:43.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327172f88dbe026c779922

Added to database: 12/5/2025, 5:45:22 AM

Last enriched: 12/5/2025, 6:04:07 AM

Last updated: 12/10/2025, 5:57:15 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats