CVE-2025-13990: CWE-352 Cross-Site Request Forgery (CSRF) in mamurjor Mamurjor Employee Info
The Mamurjor Employee Info plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to create, update, or delete employee records, departments, designations, salary grades, education records, and salary payments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13990 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Mamurjor Employee Info plugin for WordPress, affecting all versions up to and including 1.0.0. The root cause is the absence of nonce validation on multiple administrative functions within the plugin. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without nonce checks, attackers can craft malicious URLs or web requests that, when visited or triggered by an authenticated administrator, execute unauthorized actions. These actions include creating, updating, or deleting sensitive employee-related data such as employee records, departments, designations, salary grades, education records, and salary payments. The attack vector requires no prior authentication but does require user interaction, specifically an administrator clicking on a malicious link or visiting a crafted webpage. The vulnerability impacts the integrity of the data but does not affect confidentiality or availability directly. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the ease of exploitation (no authentication needed) but requiring user interaction and limited impact scope. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in December 2025 and published in January 2026 by Wordfence. Given the plugin’s administrative scope, exploitation could disrupt HR and payroll operations, leading to inaccurate employee data and potential compliance issues.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity of critical employee information managed through the Mamurjor Employee Info plugin. Unauthorized modification or deletion of employee records, salary details, and departmental data could lead to payroll errors, compliance violations with labor laws and GDPR, and loss of trust in internal HR systems. Although the vulnerability does not expose confidential data directly, manipulation of employee data can have downstream effects on financial reporting and employee relations. The requirement for administrator interaction means social engineering or phishing campaigns targeting HR or IT administrators could be effective. Organizations relying on WordPress for HR management and using this plugin are at risk of operational disruption and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public. The medium severity rating indicates a moderate but actionable risk that should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they use the Mamurjor Employee Info plugin and identify affected versions (up to 1.0.0). Since no official patch is currently available, administrators should apply manual mitigations such as implementing nonce validation on all administrative functions within the plugin code to ensure requests are legitimate. Limiting administrative access to trusted personnel and enforcing multi-factor authentication can reduce the risk of successful social engineering. Additionally, administrators should be trained to recognize and avoid phishing attempts or suspicious links that could trigger CSRF attacks. Network-level protections, such as web application firewalls (WAFs), can be configured to detect and block suspicious POST requests targeting the plugin’s endpoints. Monitoring logs for unusual administrative actions or changes in employee data can help detect exploitation attempts early. Organizations should stay alert for official patches or updates from the vendor and apply them promptly once available. Finally, consider isolating HR management systems or using alternative plugins with stronger security postures if remediation is delayed.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13990: CWE-352 Cross-Site Request Forgery (CSRF) in mamurjor Mamurjor Employee Info
Description
The Mamurjor Employee Info plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to create, update, or delete employee records, departments, designations, salary grades, education records, and salary payments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-13990 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Mamurjor Employee Info plugin for WordPress, affecting all versions up to and including 1.0.0. The root cause is the absence of nonce validation on multiple administrative functions within the plugin. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without nonce checks, attackers can craft malicious URLs or web requests that, when visited or triggered by an authenticated administrator, execute unauthorized actions. These actions include creating, updating, or deleting sensitive employee-related data such as employee records, departments, designations, salary grades, education records, and salary payments. The attack vector requires no prior authentication but does require user interaction, specifically an administrator clicking on a malicious link or visiting a crafted webpage. The vulnerability impacts the integrity of the data but does not affect confidentiality or availability directly. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the ease of exploitation (no authentication needed) but requiring user interaction and limited impact scope. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in December 2025 and published in January 2026 by Wordfence. Given the plugin’s administrative scope, exploitation could disrupt HR and payroll operations, leading to inaccurate employee data and potential compliance issues.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity of critical employee information managed through the Mamurjor Employee Info plugin. Unauthorized modification or deletion of employee records, salary details, and departmental data could lead to payroll errors, compliance violations with labor laws and GDPR, and loss of trust in internal HR systems. Although the vulnerability does not expose confidential data directly, manipulation of employee data can have downstream effects on financial reporting and employee relations. The requirement for administrator interaction means social engineering or phishing campaigns targeting HR or IT administrators could be effective. Organizations relying on WordPress for HR management and using this plugin are at risk of operational disruption and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public. The medium severity rating indicates a moderate but actionable risk that should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they use the Mamurjor Employee Info plugin and identify affected versions (up to 1.0.0). Since no official patch is currently available, administrators should apply manual mitigations such as implementing nonce validation on all administrative functions within the plugin code to ensure requests are legitimate. Limiting administrative access to trusted personnel and enforcing multi-factor authentication can reduce the risk of successful social engineering. Additionally, administrators should be trained to recognize and avoid phishing attempts or suspicious links that could trigger CSRF attacks. Network-level protections, such as web application firewalls (WAFs), can be configured to detect and block suspicious POST requests targeting the plugin’s endpoints. Monitoring logs for unusual administrative actions or changes in employee data can help detect exploitation attempts early. Organizations should stay alert for official patches or updates from the vendor and apply them promptly once available. Finally, consider isolating HR management systems or using alternative plugins with stronger security postures if remediation is delayed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T17:09:09.632Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c117349d0379d7d569b
Added to database: 1/7/2026, 12:05:37 PM
Last enriched: 1/7/2026, 12:10:28 PM
Last updated: 1/9/2026, 2:06:09 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22714: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Monaco Skin
LowCVE-2026-22710: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Wikibase Extension
LowCVE-2026-0733: SQL Injection in PHPGurukul Online Course Registration System
MediumCVE-2026-0732: Command Injection in D-Link DI-8200G
MediumCVE-2026-0731: NULL Pointer Dereference in TOTOLINK WA1200
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.