CVE-2025-12406: CWE-352 Cross-Site Request Forgery (CSRF) in awensley Project Honey Pot Spam Trap
The Project Honey Pot Spam Trap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the printAdminPage() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-12406 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability found in the Project Honey Pot Spam Trap plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability stems from missing or improper nonce validation in the printAdminPage() function, which is responsible for rendering the plugin's administrative interface. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. Without proper nonce checks, attackers can craft malicious URLs or web pages that, when visited or clicked by an authenticated site administrator, cause the administrator's browser to perform unintended actions on the vulnerable WordPress site. This can include changing plugin settings or injecting malicious scripts into the site, potentially leading to further compromise such as persistent cross-site scripting (XSS) or unauthorized configuration changes. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious request, typically by clicking a link or visiting a crafted webpage. The CVSS 3.1 base score of 6.1 reflects a network attack vector with low attack complexity, no privileges required, but requiring user interaction and impacting confidentiality and integrity with a scope change. No patches or exploit code are currently publicly available, but the vulnerability is officially published and should be addressed promptly. The plugin is used to trap and identify spam activity, making it a common tool among WordPress sites aiming to reduce spam, thus increasing the potential attack surface.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Project Honey Pot Spam Trap plugin installed. Unauthorized changes to plugin settings could disable spam protection, increasing exposure to spam and potentially harmful content. Injection of malicious scripts could lead to site defacement, data leakage, or further compromise through persistent XSS attacks, undermining user trust and potentially violating data protection regulations such as GDPR. Since the attack requires administrator interaction, targeted phishing campaigns could be used to exploit this vulnerability, increasing risk for organizations with less security-aware staff. The confidentiality and integrity of the affected websites are at risk, which can impact business operations, brand reputation, and compliance status. Although availability is not directly impacted, the indirect effects of compromised site integrity could lead to downtime or loss of customer confidence. Given the widespread use of WordPress in Europe, especially among SMEs and public sector organizations, the vulnerability poses a moderate but tangible risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately monitor for updates or patches released by the plugin vendor and apply them as soon as they become available. In the absence of an official patch, administrators can implement manual nonce validation in the printAdminPage() function to ensure that all requests modifying settings are properly authenticated and authorized. Additionally, organizations should educate WordPress administrators about the risks of phishing and social engineering attacks that could trick them into clicking malicious links. Employing web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts can provide an additional layer of defense. Regularly auditing plugin usage and minimizing the number of plugins installed reduces attack surface. Implementing multi-factor authentication (MFA) for WordPress admin accounts can also help mitigate the risk of unauthorized access resulting from social engineering. Finally, monitoring logs for unusual administrative actions can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12406: CWE-352 Cross-Site Request Forgery (CSRF) in awensley Project Honey Pot Spam Trap
Description
The Project Honey Pot Spam Trap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the printAdminPage() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-12406 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability found in the Project Honey Pot Spam Trap plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability stems from missing or improper nonce validation in the printAdminPage() function, which is responsible for rendering the plugin's administrative interface. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. Without proper nonce checks, attackers can craft malicious URLs or web pages that, when visited or clicked by an authenticated site administrator, cause the administrator's browser to perform unintended actions on the vulnerable WordPress site. This can include changing plugin settings or injecting malicious scripts into the site, potentially leading to further compromise such as persistent cross-site scripting (XSS) or unauthorized configuration changes. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious request, typically by clicking a link or visiting a crafted webpage. The CVSS 3.1 base score of 6.1 reflects a network attack vector with low attack complexity, no privileges required, but requiring user interaction and impacting confidentiality and integrity with a scope change. No patches or exploit code are currently publicly available, but the vulnerability is officially published and should be addressed promptly. The plugin is used to trap and identify spam activity, making it a common tool among WordPress sites aiming to reduce spam, thus increasing the potential attack surface.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Project Honey Pot Spam Trap plugin installed. Unauthorized changes to plugin settings could disable spam protection, increasing exposure to spam and potentially harmful content. Injection of malicious scripts could lead to site defacement, data leakage, or further compromise through persistent XSS attacks, undermining user trust and potentially violating data protection regulations such as GDPR. Since the attack requires administrator interaction, targeted phishing campaigns could be used to exploit this vulnerability, increasing risk for organizations with less security-aware staff. The confidentiality and integrity of the affected websites are at risk, which can impact business operations, brand reputation, and compliance status. Although availability is not directly impacted, the indirect effects of compromised site integrity could lead to downtime or loss of customer confidence. Given the widespread use of WordPress in Europe, especially among SMEs and public sector organizations, the vulnerability poses a moderate but tangible risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately monitor for updates or patches released by the plugin vendor and apply them as soon as they become available. In the absence of an official patch, administrators can implement manual nonce validation in the printAdminPage() function to ensure that all requests modifying settings are properly authenticated and authorized. Additionally, organizations should educate WordPress administrators about the risks of phishing and social engineering attacks that could trick them into clicking malicious links. Employing web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts can provide an additional layer of defense. Regularly auditing plugin usage and minimizing the number of plugins installed reduces attack surface. Implementing multi-factor authentication (MFA) for WordPress admin accounts can also help mitigate the risk of unauthorized access resulting from social engineering. Finally, monitoring logs for unusual administrative actions can help detect exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T14:53:21.080Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c305835a0ab0a56270fff
Added to database: 11/18/2025, 8:37:44 AM
Last enriched: 11/25/2025, 9:46:39 AM
Last updated: 1/7/2026, 8:53:46 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.