Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14062: CWE-352 Cross-Site Request Forgery (CSRF) in tekafran Animated Pixel Marquee Creator

0
Medium
VulnerabilityCVE-2025-14062cvecve-2025-14062cwe-352
Published: Fri Dec 12 2025 (12/12/2025, 03:20:55 UTC)
Source: CVE Database V5
Vendor/Project: tekafran
Product: Animated Pixel Marquee Creator

Description

The Animated Pixel Marquee Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery via the 'marquee' parameter in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the marquee deletion function. This makes it possible for unauthenticated attackers to delete arbitrary marquees via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:38:37 UTC

Technical Analysis

CVE-2025-14062 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Animated Pixel Marquee Creator plugin for WordPress, affecting all versions up to and including 1.0.0. The vulnerability stems from the absence of nonce validation on the marquee deletion function, which is a security mechanism designed to verify that requests originate from legitimate users and not from malicious third-party sites. Without this protection, an attacker can craft a malicious URL or webpage that, when visited or clicked by an authenticated site administrator, triggers the deletion of arbitrary marquee elements on the WordPress site. This attack does not require the attacker to be authenticated but does require the victim administrator to perform an action such as clicking a link, making it a user interaction-based attack. The impact is limited to the integrity of the site’s content, specifically the removal of marquee elements, with no direct effect on confidentiality or availability. The vulnerability has a CVSS v3.1 base score of 4.3, reflecting its medium severity due to ease of exploitation and limited impact scope. No patches or updates have been linked yet, and there are no known exploits in the wild. The vulnerability is categorized under CWE-352, which covers CSRF issues where state-changing requests lack proper anti-CSRF tokens or nonce validation. Given the widespread use of WordPress in Europe, sites employing this plugin are at risk of unauthorized content manipulation if mitigations are not applied.

Potential Impact

For European organizations, the primary impact of CVE-2025-14062 is the potential unauthorized deletion of marquee elements on WordPress websites using the affected plugin. While this does not compromise sensitive data or system availability, it undermines the integrity and presentation of web content, which can damage brand reputation and user trust. Organizations relying on their websites for marketing, customer engagement, or information dissemination may experience disruptions or require additional resources to restore content. The attack vector requires social engineering to trick administrators, which could be facilitated by phishing campaigns targeting European companies. Although no direct data breach or service downtime is expected, the vulnerability could be leveraged as part of a broader attack chain or to deface websites, particularly impacting sectors with high web presence such as media, e-commerce, and public services. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate CVE-2025-14062: 1) Immediately audit WordPress sites to identify installations of the Animated Pixel Marquee Creator plugin and confirm the version in use. 2) If possible, disable or remove the plugin until a security patch or update is released by the vendor. 3) Implement web application firewalls (WAF) with rules to detect and block suspicious CSRF attempts targeting the marquee deletion endpoint. 4) Educate site administrators about the risks of clicking untrusted links, especially when logged into administrative accounts. 5) Employ additional security plugins or custom nonce validation mechanisms to enforce CSRF protection on critical actions. 6) Monitor web server logs for unusual requests or patterns indicative of CSRF exploitation attempts. 7) Stay informed about vendor updates or patches and apply them promptly once available. 8) Consider restricting administrative access to trusted IP addresses or using multi-factor authentication to reduce the risk of social engineering exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T20:06:50.535Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9189650da22753edbd7c

Added to database: 12/12/2025, 3:52:41 AM

Last enriched: 12/19/2025, 5:38:37 AM

Last updated: 2/6/2026, 10:28:18 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats