Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13365: CWE-352 Cross-Site Request Forgery (CSRF) in tikolan WP Hallo Welt

0
Medium
VulnerabilityCVE-2025-13365cvecve-2025-13365cwe-352
Published: Sat Dec 20 2025 (12/20/2025, 03:20:25 UTC)
Source: CVE Database V5
Vendor/Project: tikolan
Product: WP Hallo Welt

Description

The WP Hallo Welt plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'hallo_welt_seite' function. This makes it possible for unauthenticated attackers to update plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to the insufficient input sanitization and output escaping, this can lead to Stored Cross-Site Scripting.

AI-Powered Analysis

AILast updated: 12/20/2025, 03:53:29 UTC

Technical Analysis

CVE-2025-13365 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP Hallo Welt plugin for WordPress, affecting all versions up to and including 1.4. The root cause is the absence or improper implementation of nonce validation in the 'hallo_welt_seite' function, which is responsible for handling certain plugin settings updates. Nonces in WordPress are security tokens designed to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce validation, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), cause unauthorized changes to plugin settings. Furthermore, due to insufficient input sanitization and output escaping, these unauthorized changes can include injection of malicious web scripts, leading to stored Cross-Site Scripting (XSS). Stored XSS can allow attackers to execute arbitrary JavaScript in the context of the affected site, potentially stealing session cookies, performing actions on behalf of users, or spreading malware. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (administrator clicking a link). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low but notable, while availability is unaffected. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on 2025-11-18 and published on 2025-12-20. No official patches or updates have been linked yet, so mitigation relies on best practices and monitoring.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the WP Hallo Welt plugin installed and active. Successful exploitation can lead to unauthorized modification of plugin settings and persistent injection of malicious scripts, compromising the confidentiality and integrity of the affected web applications. This can result in data theft, session hijacking, defacement, or distribution of malware to site visitors. Since the attack requires an administrator to be tricked into clicking a malicious link, organizations with less stringent user awareness or lacking multi-factor authentication for admin accounts are at higher risk. The impact on availability is negligible, but reputational damage and potential regulatory consequences under GDPR could be significant if user data is compromised. Given WordPress's widespread use in Europe for business and governmental websites, the vulnerability could affect a broad range of sectors, including e-commerce, public administration, and media. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Immediate mitigation should include disabling or uninstalling the WP Hallo Welt plugin until a patched version is released. 2. If the plugin is essential, restrict administrator access to trusted personnel and enforce strict user awareness training to prevent clicking on suspicious links. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the 'hallo_welt_seite' function or unusual parameter changes. 4. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script execution sources. 5. Monitor logs for unusual administrative actions or unexpected changes in plugin settings. 6. Ensure WordPress core and all plugins are regularly updated, and subscribe to vendor or security mailing lists for timely patch announcements. 7. Enforce multi-factor authentication (MFA) for all administrator accounts to reduce the risk of account compromise via social engineering. 8. Conduct regular security audits and penetration testing focusing on CSRF and XSS vulnerabilities in WordPress environments. 9. Prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T17:08:35.108Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694619d2c376abdb7ecb86a9

Added to database: 12/20/2025, 3:36:50 AM

Last enriched: 12/20/2025, 3:53:29 AM

Last updated: 12/20/2025, 9:03:13 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats