CVE-2025-14062: CWE-352 Cross-Site Request Forgery (CSRF) in tekafran Animated Pixel Marquee Creator
The Animated Pixel Marquee Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery via the 'marquee' parameter in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the marquee deletion function. This makes it possible for unauthenticated attackers to delete arbitrary marquees via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14062 affects the Animated Pixel Marquee Creator plugin for WordPress, specifically all versions up to and including 1.0.0. This plugin allows users to create animated pixel marquees on their websites. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, caused by the absence of nonce validation in the marquee deletion function. Nonce validation is a security measure used to ensure that requests to perform sensitive actions originate from legitimate users and not from malicious third parties. Without this protection, an attacker can craft a malicious link or webpage that, when visited or clicked by an authenticated site administrator, triggers the deletion of arbitrary marquees without their consent. The vulnerability does not require the attacker to be authenticated, but it does require the administrator to perform an action such as clicking a link, making user interaction necessary. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, no privileges required, but requiring user interaction. The impact affects integrity by allowing unauthorized deletion of content, but confidentiality and availability remain unaffected. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The vulnerability was published on December 12, 2025, and assigned by Wordfence. Organizations using this plugin should be aware of the risk and monitor for suspicious activity related to marquee deletion requests.
Potential Impact
The primary impact of this vulnerability is on the integrity of website content managed through the Animated Pixel Marquee Creator plugin. An attacker can cause unauthorized deletion of marquee elements, potentially disrupting website appearance or functionality that relies on these visual components. While this does not compromise sensitive data confidentiality or overall site availability, it can degrade user experience and damage the site’s visual branding. For organizations, especially those relying on this plugin for marketing or user engagement, such unauthorized changes could lead to reputational harm or loss of trust. Since exploitation requires tricking an administrator into clicking a malicious link, social engineering is a key factor. The scope is limited to WordPress sites using this specific plugin, but given WordPress’s widespread use, the number of potentially affected sites could be significant. No known exploits in the wild reduce immediate risk, but the vulnerability remains exploitable until fixed. Attackers might leverage this flaw as part of a broader attack chain or to cause targeted disruption.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if their WordPress installations use the Animated Pixel Marquee Creator plugin, especially versions up to 1.0.0. If so, they should: 1) Disable or remove the plugin until a security patch or update is released by the vendor. 2) Implement strict administrative access controls and educate administrators about the risks of clicking unknown or suspicious links, emphasizing the threat of CSRF attacks. 3) Employ web application firewalls (WAFs) that can detect and block suspicious POST requests lacking proper nonce tokens or originating from untrusted sources. 4) Monitor server logs for unusual marquee deletion requests or patterns indicative of CSRF attempts. 5) Encourage the plugin vendor to release a patch that adds nonce validation to all sensitive actions, including marquee deletion. 6) Consider adding additional CSRF protections at the WordPress site level, such as plugins that enforce nonce validation site-wide or limit administrative actions to trusted IP addresses. These steps will reduce the risk of exploitation until an official fix is available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2025-14062: CWE-352 Cross-Site Request Forgery (CSRF) in tekafran Animated Pixel Marquee Creator
Description
The Animated Pixel Marquee Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery via the 'marquee' parameter in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the marquee deletion function. This makes it possible for unauthenticated attackers to delete arbitrary marquees via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-14062 affects the Animated Pixel Marquee Creator plugin for WordPress, specifically all versions up to and including 1.0.0. This plugin allows users to create animated pixel marquees on their websites. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, caused by the absence of nonce validation in the marquee deletion function. Nonce validation is a security measure used to ensure that requests to perform sensitive actions originate from legitimate users and not from malicious third parties. Without this protection, an attacker can craft a malicious link or webpage that, when visited or clicked by an authenticated site administrator, triggers the deletion of arbitrary marquees without their consent. The vulnerability does not require the attacker to be authenticated, but it does require the administrator to perform an action such as clicking a link, making user interaction necessary. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, no privileges required, but requiring user interaction. The impact affects integrity by allowing unauthorized deletion of content, but confidentiality and availability remain unaffected. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The vulnerability was published on December 12, 2025, and assigned by Wordfence. Organizations using this plugin should be aware of the risk and monitor for suspicious activity related to marquee deletion requests.
Potential Impact
The primary impact of this vulnerability is on the integrity of website content managed through the Animated Pixel Marquee Creator plugin. An attacker can cause unauthorized deletion of marquee elements, potentially disrupting website appearance or functionality that relies on these visual components. While this does not compromise sensitive data confidentiality or overall site availability, it can degrade user experience and damage the site’s visual branding. For organizations, especially those relying on this plugin for marketing or user engagement, such unauthorized changes could lead to reputational harm or loss of trust. Since exploitation requires tricking an administrator into clicking a malicious link, social engineering is a key factor. The scope is limited to WordPress sites using this specific plugin, but given WordPress’s widespread use, the number of potentially affected sites could be significant. No known exploits in the wild reduce immediate risk, but the vulnerability remains exploitable until fixed. Attackers might leverage this flaw as part of a broader attack chain or to cause targeted disruption.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if their WordPress installations use the Animated Pixel Marquee Creator plugin, especially versions up to 1.0.0. If so, they should: 1) Disable or remove the plugin until a security patch or update is released by the vendor. 2) Implement strict administrative access controls and educate administrators about the risks of clicking unknown or suspicious links, emphasizing the threat of CSRF attacks. 3) Employ web application firewalls (WAFs) that can detect and block suspicious POST requests lacking proper nonce tokens or originating from untrusted sources. 4) Monitor server logs for unusual marquee deletion requests or patterns indicative of CSRF attempts. 5) Encourage the plugin vendor to release a patch that adds nonce validation to all sensitive actions, including marquee deletion. 6) Consider adding additional CSRF protections at the WordPress site level, such as plugins that enforce nonce validation site-wide or limit administrative actions to trusted IP addresses. These steps will reduce the risk of exploitation until an official fix is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T20:06:50.535Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9189650da22753edbd7c
Added to database: 12/12/2025, 3:52:41 AM
Last enriched: 2/27/2026, 10:46:17 AM
Last updated: 3/24/2026, 11:23:14 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.