Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13621: CWE-352 Cross-Site Request Forgery (CSRF) in teamdream dream gallery

0
Medium
VulnerabilityCVE-2025-13621cvecve-2025-13621cwe-352
Published: Fri Dec 05 2025 (12/05/2025, 05:31:22 UTC)
Source: CVE Database V5
Vendor/Project: teamdream
Product: dream gallery

Description

The dream gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'dreampluginsmain' AJAX action. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:02:15 UTC

Technical Analysis

CVE-2025-13621 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'dream gallery' WordPress plugin developed by teamdream, affecting all versions up to and including 1.0. The root cause is the absence or improper implementation of nonce validation on the AJAX action named 'dreampluginsmain'. Nonces in WordPress serve as tokens to verify that requests originate from legitimate users and prevent unauthorized commands. Without proper nonce checks, attackers can craft malicious web requests that, when executed by an authenticated administrator (e.g., by clicking a malicious link), cause unintended changes to the plugin's settings or enable injection of malicious scripts. This can lead to persistent cross-site scripting (XSS) attacks or unauthorized configuration changes, undermining site security and user trust. The vulnerability is remotely exploitable over the network without authentication but requires user interaction (an admin clicking a crafted link). The CVSS v3.1 score of 6.1 reflects a medium severity, considering the low attack complexity and no privileges required, but the need for user interaction and limited impact on availability. No patches or exploits are currently reported, but the vulnerability's presence in a widely used CMS plugin raises concerns. The vulnerability's scope is confined to the affected plugin but can have broader implications if exploited to inject malicious scripts that affect site visitors or administrators.

Potential Impact

For European organizations, especially those relying on WordPress for corporate websites, e-commerce, or content management, this vulnerability poses a risk to site integrity and confidentiality. Successful exploitation could allow attackers to alter plugin settings, potentially enabling further attacks such as persistent XSS, which can steal user credentials, session cookies, or deliver malware to site visitors. This undermines customer trust and can lead to reputational damage, regulatory scrutiny under GDPR for data breaches, and potential financial losses. Organizations with administrators who frequently access WordPress dashboards are at higher risk due to the required user interaction. The impact is particularly significant for sectors with high online presence such as retail, media, and government services. Although availability is not directly affected, the indirect consequences of injected malicious scripts can disrupt normal operations and user experience. The lack of known exploits in the wild provides a window for proactive mitigation, but the medium severity score indicates that organizations should not delay addressing this vulnerability.

Mitigation Recommendations

1. Monitor for and apply any official patches or updates from the plugin vendor as soon as they become available. 2. Until patches are released, consider disabling or uninstalling the 'dream gallery' plugin if it is not critical to operations. 3. Implement strict nonce validation on all AJAX actions within the plugin code to ensure requests are legitimate. 4. Educate WordPress administrators about the risks of clicking unknown or suspicious links, especially while logged into admin accounts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'dreampluginsmain' action. 6. Regularly audit plugin configurations and monitor logs for unusual changes or access patterns. 7. Use Content Security Policy (CSP) headers to limit the impact of any injected scripts. 8. Limit administrative access to trusted networks or use multi-factor authentication to reduce the risk of compromised admin accounts. 9. Conduct periodic security assessments of WordPress installations to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T20:43:27.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327173f88dbe026c7799c1

Added to database: 12/5/2025, 5:45:23 AM

Last enriched: 12/5/2025, 6:02:15 AM

Last updated: 12/11/2025, 4:23:30 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats