CVE-2025-13990: CWE-352 Cross-Site Request Forgery (CSRF) in mamurjor Mamurjor Employee Info
The Mamurjor Employee Info plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to create, update, or delete employee records, departments, designations, salary grades, education records, and salary payments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The Mamurjor Employee Info plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-13990, affecting all versions up to and including 1.0.0. The root cause is the absence of nonce validation on several administrative functions within the plugin. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without nonce checks, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious site), perform unauthorized actions on the WordPress site. These actions include creating, updating, or deleting employee records, departments, designations, salary grades, education records, and salary payments. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious request, making social engineering a key exploitation vector. The CVSS 3.1 base score of 4.3 reflects a medium severity, with no impact on confidentiality or availability but a partial impact on data integrity. No patches or fixes are currently linked, and no known exploits are in the wild. This vulnerability highlights the importance of implementing nonce validation in WordPress plugins to prevent CSRF attacks.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized modification of sensitive employee data within the affected WordPress sites. Attackers can manipulate critical HR-related information such as employee records, departmental structures, salary information, and educational credentials. This can lead to data integrity issues, loss of trust, and potential regulatory compliance violations, especially in organizations subject to data protection laws. Although confidentiality and availability are not directly affected, the integrity compromise can disrupt HR operations and payroll processing. Organizations relying on the Mamurjor Employee Info plugin may face operational challenges, reputational damage, and increased risk of insider threats if attackers leverage this vulnerability for malicious purposes. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments with less security awareness.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify whether they use the Mamurjor Employee Info plugin and upgrade to a patched version once available. In the absence of an official patch, administrators or developers should implement nonce validation on all administrative actions within the plugin to ensure requests are legitimate. Additionally, organizations should educate WordPress administrators about the risks of CSRF and social engineering attacks, emphasizing caution when clicking on unsolicited links or visiting untrusted websites while logged into administrative accounts. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts can provide an additional layer of defense. Restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) can further reduce exploitation risk. Regular security audits of WordPress plugins and monitoring for unusual administrative activity are also recommended.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Netherlands
CVE-2025-13990: CWE-352 Cross-Site Request Forgery (CSRF) in mamurjor Mamurjor Employee Info
Description
The Mamurjor Employee Info plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to create, update, or delete employee records, departments, designations, salary grades, education records, and salary payments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Mamurjor Employee Info plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-13990, affecting all versions up to and including 1.0.0. The root cause is the absence of nonce validation on several administrative functions within the plugin. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without nonce checks, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious site), perform unauthorized actions on the WordPress site. These actions include creating, updating, or deleting employee records, departments, designations, salary grades, education records, and salary payments. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious request, making social engineering a key exploitation vector. The CVSS 3.1 base score of 4.3 reflects a medium severity, with no impact on confidentiality or availability but a partial impact on data integrity. No patches or fixes are currently linked, and no known exploits are in the wild. This vulnerability highlights the importance of implementing nonce validation in WordPress plugins to prevent CSRF attacks.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized modification of sensitive employee data within the affected WordPress sites. Attackers can manipulate critical HR-related information such as employee records, departmental structures, salary information, and educational credentials. This can lead to data integrity issues, loss of trust, and potential regulatory compliance violations, especially in organizations subject to data protection laws. Although confidentiality and availability are not directly affected, the integrity compromise can disrupt HR operations and payroll processing. Organizations relying on the Mamurjor Employee Info plugin may face operational challenges, reputational damage, and increased risk of insider threats if attackers leverage this vulnerability for malicious purposes. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments with less security awareness.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify whether they use the Mamurjor Employee Info plugin and upgrade to a patched version once available. In the absence of an official patch, administrators or developers should implement nonce validation on all administrative actions within the plugin to ensure requests are legitimate. Additionally, organizations should educate WordPress administrators about the risks of CSRF and social engineering attacks, emphasizing caution when clicking on unsolicited links or visiting untrusted websites while logged into administrative accounts. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts can provide an additional layer of defense. Restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) can further reduce exploitation risk. Regular security audits of WordPress plugins and monitoring for unusual administrative activity are also recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T17:09:09.632Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c117349d0379d7d569b
Added to database: 1/7/2026, 12:05:37 PM
Last enriched: 2/27/2026, 10:39:14 AM
Last updated: 3/24/2026, 4:29:46 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.