CVE-2025-13629: CWE-352 Cross-Site Request Forgery (CSRF) in xbenx WP Landing Page
The WP Landing Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9.3. This is due to missing nonce validation on the 'wplp_api_update_text' function. This makes it possible for unauthenticated attackers to update arbitrary post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13629 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP Landing Page plugin for WordPress, affecting all versions up to and including 0.9.3. The root cause is the absence of nonce validation in the 'wplp_api_update_text' function, which is responsible for updating post meta data. Nonces in WordPress serve as tokens to verify the legitimacy of requests, preventing unauthorized actions. Without this validation, attackers can craft malicious requests that, when executed by an authenticated administrator (typically by clicking a specially crafted link), result in unauthorized modification of post meta data. This can lead to content tampering or manipulation of site metadata, potentially undermining site integrity and trustworthiness. The vulnerability requires no authentication from the attacker but does require user interaction from an administrator, limiting the attack vector to social engineering techniques. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the limited impact scope (no confidentiality or availability impact) and the requirement for user interaction. No patches or official fixes are currently published, and no known exploits have been reported in the wild. The vulnerability is cataloged under CWE-352, which covers CSRF issues. Given the widespread use of WordPress and the popularity of landing page plugins, this vulnerability poses a moderate risk, especially to sites with administrative users who may be targeted via phishing or malicious links.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized modification of website content or metadata, which can damage brand reputation, mislead customers, or disrupt marketing campaigns. Since the vulnerability requires an administrator to perform an action, the risk is somewhat mitigated by user awareness and access controls but remains significant in environments with less stringent security training or where phishing attacks are prevalent. The integrity of web content is critical for organizations relying on their websites for customer engagement, sales, or information dissemination. Additionally, manipulated content could be used to inject misleading information or malicious links, indirectly leading to further compromise or loss of user trust. While the vulnerability does not directly affect confidentiality or availability, the reputational damage and potential downstream impacts on business operations can be substantial. European organizations with high web presence, especially those in sectors like e-commerce, media, and public services, are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
1. Monitor the WP Landing Page plugin vendor announcements closely and apply security patches immediately once they are released. 2. Until a patch is available, restrict administrative users from accessing untrusted websites or clicking on suspicious links to reduce the risk of CSRF exploitation. 3. Implement Content Security Policy (CSP) headers to limit the domains from which scripts and requests can be executed, reducing the risk of malicious request injection. 4. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block CSRF attack patterns targeting WordPress admin endpoints. 5. Enforce multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of account compromise through phishing. 6. Educate administrators and site managers about the risks of phishing and social engineering attacks that could lead to CSRF exploitation. 7. Consider temporarily disabling or limiting the use of the vulnerable plugin if it is not critical to operations until a fix is available. 8. Regularly audit WordPress plugins for security updates and vulnerabilities to maintain a secure plugin ecosystem.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13629: CWE-352 Cross-Site Request Forgery (CSRF) in xbenx WP Landing Page
Description
The WP Landing Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9.3. This is due to missing nonce validation on the 'wplp_api_update_text' function. This makes it possible for unauthenticated attackers to update arbitrary post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-13629 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP Landing Page plugin for WordPress, affecting all versions up to and including 0.9.3. The root cause is the absence of nonce validation in the 'wplp_api_update_text' function, which is responsible for updating post meta data. Nonces in WordPress serve as tokens to verify the legitimacy of requests, preventing unauthorized actions. Without this validation, attackers can craft malicious requests that, when executed by an authenticated administrator (typically by clicking a specially crafted link), result in unauthorized modification of post meta data. This can lead to content tampering or manipulation of site metadata, potentially undermining site integrity and trustworthiness. The vulnerability requires no authentication from the attacker but does require user interaction from an administrator, limiting the attack vector to social engineering techniques. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the limited impact scope (no confidentiality or availability impact) and the requirement for user interaction. No patches or official fixes are currently published, and no known exploits have been reported in the wild. The vulnerability is cataloged under CWE-352, which covers CSRF issues. Given the widespread use of WordPress and the popularity of landing page plugins, this vulnerability poses a moderate risk, especially to sites with administrative users who may be targeted via phishing or malicious links.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized modification of website content or metadata, which can damage brand reputation, mislead customers, or disrupt marketing campaigns. Since the vulnerability requires an administrator to perform an action, the risk is somewhat mitigated by user awareness and access controls but remains significant in environments with less stringent security training or where phishing attacks are prevalent. The integrity of web content is critical for organizations relying on their websites for customer engagement, sales, or information dissemination. Additionally, manipulated content could be used to inject misleading information or malicious links, indirectly leading to further compromise or loss of user trust. While the vulnerability does not directly affect confidentiality or availability, the reputational damage and potential downstream impacts on business operations can be substantial. European organizations with high web presence, especially those in sectors like e-commerce, media, and public services, are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
1. Monitor the WP Landing Page plugin vendor announcements closely and apply security patches immediately once they are released. 2. Until a patch is available, restrict administrative users from accessing untrusted websites or clicking on suspicious links to reduce the risk of CSRF exploitation. 3. Implement Content Security Policy (CSP) headers to limit the domains from which scripts and requests can be executed, reducing the risk of malicious request injection. 4. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block CSRF attack patterns targeting WordPress admin endpoints. 5. Enforce multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of account compromise through phishing. 6. Educate administrators and site managers about the risks of phishing and social engineering attacks that could lead to CSRF exploitation. 7. Consider temporarily disabling or limiting the use of the vulnerable plugin if it is not critical to operations until a fix is available. 8. Regularly audit WordPress plugins for security updates and vulnerabilities to maintain a secure plugin ecosystem.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T21:40:10.616Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c71e11163305efef3dd5
Added to database: 12/6/2025, 6:03:10 AM
Last enriched: 12/6/2025, 6:11:52 AM
Last updated: 12/10/2025, 1:38:15 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67507: CWE-287: Improper Authentication in filamentphp filament
HighCVE-2025-67485: CWE-693: Protection Mechanism Failure in machphy mad-proxy
MediumCVE-2025-67503
UnknownCVE-2025-67502: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in remram44 taguette
MediumCVE-2025-64898: Insufficiently Protected Credentials (CWE-522) in Adobe ColdFusion
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.