CVE-2025-13621: CWE-352 Cross-Site Request Forgery (CSRF) in teamdream dream gallery
The dream gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'dreampluginsmain' AJAX action. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13621 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the 'dream gallery' WordPress plugin developed by teamdream. This vulnerability affects all versions up to and including 1.0. The root cause is the absence or incorrect implementation of nonce validation on the AJAX action 'dreampluginsmain', which is intended to protect against unauthorized requests. Nonces in WordPress serve as tokens to verify that a request originates from a legitimate source; their absence allows attackers to craft malicious requests that appear legitimate. An unauthenticated attacker can exploit this by tricking an authenticated site administrator into clicking a specially crafted link or visiting a malicious webpage. Upon successful exploitation, the attacker can modify plugin settings and inject malicious web scripts, potentially leading to persistent cross-site scripting (XSS) attacks or other malicious behaviors. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on 2025-11-24 and published on 2025-12-05 by Wordfence.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of plugin settings and injection of malicious scripts, which can lead to compromised site integrity and potential exploitation of site visitors through malicious payloads. Organizations running WordPress sites with the dream gallery plugin are at risk of having their administrative settings altered without consent, which could facilitate further attacks such as persistent XSS or redirecting users to malicious sites. This can damage organizational reputation, lead to data leakage, and potentially result in regulatory compliance issues if user data is compromised. Since the attack requires tricking an administrator into clicking a link, social engineering is a key factor, increasing the risk in environments where administrators may be targeted via phishing. The vulnerability does not impact system availability directly but can degrade trust and security posture significantly.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if they are using the dream gallery plugin and its version. Since no official patch is currently linked, administrators should consider temporarily disabling or uninstalling the plugin until a secure update is released. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests to the 'dreampluginsmain' action can help reduce risk. Educate site administrators about the risks of clicking unknown or suspicious links, especially those that could trigger administrative actions. Monitoring administrative actions and plugin settings for unauthorized changes can provide early detection of exploitation attempts. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date and subscribe to security advisories from the plugin vendor or trusted security sources for timely patch releases.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-13621: CWE-352 Cross-Site Request Forgery (CSRF) in teamdream dream gallery
Description
The dream gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'dreampluginsmain' AJAX action. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13621 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the 'dream gallery' WordPress plugin developed by teamdream. This vulnerability affects all versions up to and including 1.0. The root cause is the absence or incorrect implementation of nonce validation on the AJAX action 'dreampluginsmain', which is intended to protect against unauthorized requests. Nonces in WordPress serve as tokens to verify that a request originates from a legitimate source; their absence allows attackers to craft malicious requests that appear legitimate. An unauthenticated attacker can exploit this by tricking an authenticated site administrator into clicking a specially crafted link or visiting a malicious webpage. Upon successful exploitation, the attacker can modify plugin settings and inject malicious web scripts, potentially leading to persistent cross-site scripting (XSS) attacks or other malicious behaviors. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on 2025-11-24 and published on 2025-12-05 by Wordfence.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of plugin settings and injection of malicious scripts, which can lead to compromised site integrity and potential exploitation of site visitors through malicious payloads. Organizations running WordPress sites with the dream gallery plugin are at risk of having their administrative settings altered without consent, which could facilitate further attacks such as persistent XSS or redirecting users to malicious sites. This can damage organizational reputation, lead to data leakage, and potentially result in regulatory compliance issues if user data is compromised. Since the attack requires tricking an administrator into clicking a link, social engineering is a key factor, increasing the risk in environments where administrators may be targeted via phishing. The vulnerability does not impact system availability directly but can degrade trust and security posture significantly.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if they are using the dream gallery plugin and its version. Since no official patch is currently linked, administrators should consider temporarily disabling or uninstalling the plugin until a secure update is released. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests to the 'dreampluginsmain' action can help reduce risk. Educate site administrators about the risks of clicking unknown or suspicious links, especially those that could trigger administrative actions. Monitoring administrative actions and plugin settings for unauthorized changes can provide early detection of exploitation attempts. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date and subscribe to security advisories from the plugin vendor or trusted security sources for timely patch releases.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T20:43:27.215Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327173f88dbe026c7799c1
Added to database: 12/5/2025, 5:45:23 AM
Last enriched: 2/27/2026, 10:04:16 AM
Last updated: 3/23/2026, 11:44:53 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.