CVE-2025-13360: CWE-352 Cross-Site Request Forgery (CSRF) in monkeyboz Quantic Social Image Hover
The Quantic Social Image Hover plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13360 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Quantic Social Image Hover plugin for WordPress, versions up to and including 1.0.8. The root cause is the absence of nonce validation on the settings update endpoint, a critical security control that prevents unauthorized state-changing requests. Without nonce verification, attackers can craft malicious URLs or web pages that, when visited by a logged-in WordPress administrator, cause the plugin’s settings to be altered without consent. This can lead to injection of malicious web scripts, potentially enabling further attacks such as persistent cross-site scripting (XSS) or manipulation of site behavior. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious content (user interaction). The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a moderate impact on integrity. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is developed by monkeyboz and is used primarily on WordPress sites to enhance social image hover effects, which may limit the scope but still poses a risk to affected sites.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modification of plugin settings and injection of malicious scripts on WordPress sites using the Quantic Social Image Hover plugin. This may result in defacement, redirection to malicious sites, or further exploitation through script injection. While the direct impact on confidentiality and availability is low, the integrity of the website’s content and user trust can be compromised. Organizations relying on WordPress for public-facing websites or intranet portals are at risk, especially if administrators are not trained to recognize phishing or social engineering attempts that could trigger this vulnerability. The attack vector requires user interaction, which somewhat limits mass exploitation but targeted attacks against high-value sites remain a concern. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Quantic Social Image Hover plugin to a patched version once available. In the absence of an official patch, administrators should restrict access to the WordPress admin panel to trusted IP addresses and enforce multi-factor authentication to reduce the risk of compromised credentials. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide additional protection. Educate site administrators about the risks of clicking on unsolicited links and the importance of verifying URLs before interaction. Additionally, site owners can temporarily disable or remove the plugin if it is not critical to operations until a secure version is released. Monitoring for unusual changes in plugin settings or unexpected script injections can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13360: CWE-352 Cross-Site Request Forgery (CSRF) in monkeyboz Quantic Social Image Hover
Description
The Quantic Social Image Hover plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-13360 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Quantic Social Image Hover plugin for WordPress, versions up to and including 1.0.8. The root cause is the absence of nonce validation on the settings update endpoint, a critical security control that prevents unauthorized state-changing requests. Without nonce verification, attackers can craft malicious URLs or web pages that, when visited by a logged-in WordPress administrator, cause the plugin’s settings to be altered without consent. This can lead to injection of malicious web scripts, potentially enabling further attacks such as persistent cross-site scripting (XSS) or manipulation of site behavior. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious content (user interaction). The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a moderate impact on integrity. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is developed by monkeyboz and is used primarily on WordPress sites to enhance social image hover effects, which may limit the scope but still poses a risk to affected sites.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modification of plugin settings and injection of malicious scripts on WordPress sites using the Quantic Social Image Hover plugin. This may result in defacement, redirection to malicious sites, or further exploitation through script injection. While the direct impact on confidentiality and availability is low, the integrity of the website’s content and user trust can be compromised. Organizations relying on WordPress for public-facing websites or intranet portals are at risk, especially if administrators are not trained to recognize phishing or social engineering attempts that could trigger this vulnerability. The attack vector requires user interaction, which somewhat limits mass exploitation but targeted attacks against high-value sites remain a concern. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the Quantic Social Image Hover plugin to a patched version once available. In the absence of an official patch, administrators should restrict access to the WordPress admin panel to trusted IP addresses and enforce multi-factor authentication to reduce the risk of compromised credentials. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide additional protection. Educate site administrators about the risks of clicking on unsolicited links and the importance of verifying URLs before interaction. Additionally, site owners can temporarily disable or remove the plugin if it is not critical to operations until a secure version is released. Monitoring for unusual changes in plugin settings or unexpected script injections can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T16:31:13.464Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327173f88dbe026c7799af
Added to database: 12/5/2025, 5:45:23 AM
Last enriched: 12/5/2025, 6:02:56 AM
Last updated: 12/7/2025, 4:13:22 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
MediumCVE-2025-14182: Path Traversal in Sobey Media Convergence System
MediumCVE-2025-14141: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14140: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14139: Buffer Overflow in UTT 进取 520W
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.