Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14062: CWE-352 Cross-Site Request Forgery (CSRF) in tekafran Animated Pixel Marquee Creator

0
Medium
VulnerabilityCVE-2025-14062cvecve-2025-14062cwe-352
Published: Fri Dec 12 2025 (12/12/2025, 03:20:55 UTC)
Source: CVE Database V5
Vendor/Project: tekafran
Product: Animated Pixel Marquee Creator

Description

The Animated Pixel Marquee Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery via the 'marquee' parameter in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the marquee deletion function. This makes it possible for unauthenticated attackers to delete arbitrary marquees via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/12/2025, 04:17:09 UTC

Technical Analysis

CVE-2025-14062 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Animated Pixel Marquee Creator plugin for WordPress, affecting all versions up to and including 1.0.0. The vulnerability stems from the absence of nonce validation on the marquee deletion function, which is a security token mechanism designed to prevent unauthorized actions. Without this validation, an attacker can craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a specially crafted link), results in the deletion of arbitrary marquee elements on the site. This attack vector requires no prior authentication by the attacker but does require user interaction from a privileged user, making social engineering a likely exploitation method. The vulnerability impacts the integrity of the site content by allowing unauthorized deletion of marquee elements but does not affect confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact scope. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is used in WordPress environments, which are widespread, and the vulnerability could be leveraged to disrupt site content management or deface sites by removing visual elements.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites using the Animated Pixel Marquee Creator plugin. Unauthorized deletion of marquee elements could degrade user experience, damage brand reputation, or disrupt marketing content. While it does not directly compromise sensitive data or site availability, the ability to manipulate site content without authorization can be leveraged in broader social engineering or phishing campaigns. Organizations with public-facing websites that rely on this plugin for visual content are particularly vulnerable. The attack requires tricking an administrator, so organizations with less stringent user awareness or weak internal security policies are at higher risk. Additionally, compromised site integrity can indirectly affect customer trust and compliance with data protection regulations if the site is part of a broader service ecosystem.

Mitigation Recommendations

Since no official patch links are currently available, European organizations should implement immediate compensating controls. These include disabling or uninstalling the Animated Pixel Marquee Creator plugin until a secure version is released. Administrators should be trained to recognize and avoid suspicious links, especially those that could trigger unintended actions on administrative interfaces. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the marquee deletion endpoint can reduce risk. Site owners should enforce strict user session management and consider adding manual nonce validation or CSRF tokens in the plugin code if feasible. Regular backups of site content are essential to recover quickly from unauthorized changes. Monitoring administrative actions and audit logs can help detect exploitation attempts early. Finally, organizations should subscribe to vendor and security advisories to apply official patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T20:06:50.535Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9189650da22753edbd7c

Added to database: 12/12/2025, 3:52:41 AM

Last enriched: 12/12/2025, 4:17:09 AM

Last updated: 12/12/2025, 11:16:12 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats