Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13408: CWE-352 Cross-Site Request Forgery (CSRF) in foxtheme Foxtool All-in-One: Contact chat button, Custom login, Media optimize images

0
Medium
VulnerabilityCVE-2025-13408cvecve-2025-13408cwe-352
Published: Fri Dec 12 2025 (12/12/2025, 03:20:43 UTC)
Source: CVE Database V5
Vendor/Project: foxtheme
Product: Foxtool All-in-One: Contact chat button, Custom login, Media optimize images

Description

The Foxtool All-in-One: Contact chat button, Custom login, Media optimize images plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.2. This is due to missing or incorrect nonce validation on the foxtool_login_google() function. This makes it possible for unauthenticated attackers to establish an OAuth Connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:50:54 UTC

Technical Analysis

CVE-2025-13408 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Foxtool All-in-One WordPress plugin, which provides features such as a contact chat button, custom login, and media image optimization. The vulnerability exists in all versions up to and including 2.5.2 due to missing or incorrect nonce validation in the foxtool_login_google() function. Nonces are security tokens used to verify the legitimacy of requests, and their absence allows attackers to craft malicious requests that appear legitimate to the server. An unauthenticated attacker can exploit this by tricking a site administrator into clicking a specially crafted link, which then causes the administrator's browser to perform an unintended action—specifically, establishing an OAuth connection. This could potentially allow the attacker to gain unauthorized access or perform actions on behalf of the administrator. The vulnerability affects the integrity of the affected WordPress sites by enabling unauthorized OAuth connections but does not directly expose confidential data or disrupt service availability. The attack requires user interaction (clicking a link) and does not require prior authentication, increasing the risk but limiting automated exploitation. No public exploits have been reported yet, and no patches are currently linked, indicating that users should monitor vendor updates closely. The CVSS 3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and no availability impact.

Potential Impact

The primary impact of this vulnerability is on the integrity of affected WordPress sites using the Foxtool All-in-One plugin. By exploiting the CSRF flaw, attackers can cause site administrators to unknowingly establish OAuth connections, potentially granting attackers unauthorized access or control over site functions tied to OAuth authentication. This could lead to further exploitation such as privilege escalation, unauthorized content modification, or insertion of malicious code. Although confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in the affected websites and lead to reputational damage. Organizations relying on this plugin, especially those with high administrative activity or sensitive user data, face increased risk of targeted attacks leveraging this vulnerability. The requirement for user interaction and the absence of known exploits reduce the immediacy of the threat but do not eliminate the risk, particularly in phishing or social engineering scenarios.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately verify whether they use the Foxtool All-in-One plugin and identify the version in use. Since no official patches are currently linked, administrators should implement the following specific measures: (1) Disable or remove the Foxtool All-in-One plugin until a patched version is released; (2) Restrict administrative access to trusted networks or use multi-factor authentication to reduce the risk of unauthorized OAuth connections; (3) Educate site administrators about the risks of clicking unsolicited links, especially those that could trigger administrative actions; (4) Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the foxtool_login_google() function; (5) Monitor OAuth connection logs for unusual or unauthorized connections; (6) Follow the vendor’s communications closely and apply patches immediately upon release; (7) Consider using alternative plugins with verified security practices for contact chat, login customization, and media optimization; and (8) Employ Content Security Policy (CSP) headers to reduce the risk of cross-site scripting that could facilitate CSRF attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T14:19:13.288Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9183650da22753edbb1f

Added to database: 12/12/2025, 3:52:35 AM

Last enriched: 2/27/2026, 9:50:54 AM

Last updated: 3/24/2026, 12:29:42 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses