Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14159: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Secure Copy Content Protection and Content Locking

0
Medium
VulnerabilityCVE-2025-14159cvecve-2025-14159cwe-352
Published: Fri Dec 12 2025 (12/12/2025, 11:15:49 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Secure Copy Content Protection and Content Locking

Description

The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.2. This is due to missing nonce validation on the 'ays_sccp_results_export_file' AJAX action. This makes it possible for unauthenticated attackers to export sensitive plugin data including email addresses, IP addresses, physical addresses, user IDs, and other user information via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The exported data is stored in a publicly accessible file, allowing attackers to receive the sensitive information even though they are not authenticated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:58:09 UTC

Technical Analysis

The vulnerability CVE-2025-14159 affects the ays-pro Secure Copy Content Protection and Content Locking plugin for WordPress, versions up to and including 4.9.2. It is a Cross-Site Request Forgery (CSRF) issue classified under CWE-352, caused by the absence of nonce validation on the AJAX action 'ays_sccp_results_export_file'. Nonce validation is a security mechanism used in WordPress to verify that requests originate from legitimate users and not from forged or malicious sources. Without this validation, an attacker can craft a malicious link or webpage that, when visited or clicked by a site administrator, triggers the export of sensitive plugin data. This data includes personally identifiable information such as email addresses, IP addresses, physical addresses, user IDs, and other user-related information. The exported data is saved in a publicly accessible file on the server, allowing the attacker to access it without any authentication. The attack requires social engineering to convince an administrator to perform the action, but no prior authentication or elevated privileges are needed for the attacker. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity level due to the limited impact on integrity and availability but a clear confidentiality breach. There are no known exploits in the wild at the time of publication, and no official patches or updates have been linked yet. This vulnerability poses a significant privacy risk, especially for websites handling sensitive user data via this plugin.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive user information, including email addresses, IP addresses, physical addresses, and user IDs. This data leakage can lead to privacy violations, identity theft, targeted phishing attacks, and reputational damage for affected organizations. Since the exported data is stored in a publicly accessible file, attackers can repeatedly access the information without further interaction. Although the vulnerability does not directly affect system integrity or availability, the exposure of personal data can have severe compliance and legal consequences, especially under data protection regulations such as GDPR or CCPA. Organizations relying on this plugin for content protection may suffer loss of user trust and potential financial penalties. The requirement for user interaction (administrator clicking a malicious link) somewhat limits the exploitability but does not eliminate the risk, especially in environments where administrators may be targeted via spear-phishing or social engineering campaigns.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement nonce validation on the 'ays_sccp_results_export_file' AJAX action to ensure requests are legitimate and originate from authorized users. Plugin developers should release an update that enforces this validation and restricts access to export functionality strictly to authenticated and authorized administrators. Until a patch is available, administrators should avoid clicking on untrusted links or visiting suspicious websites while logged into the WordPress admin panel. Additionally, restrict access permissions to the directory where exported files are stored, ensuring these files are not publicly accessible via direct URL. Web application firewalls (WAFs) can be configured to detect and block suspicious AJAX requests targeting this action. Regularly audit and monitor server logs for unusual export activity. Organizations should also educate administrators about the risks of social engineering and implement multi-factor authentication to reduce the risk of compromised admin accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T20:38:26.784Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bfc942d1261d38d80bdac

Added to database: 12/12/2025, 11:29:24 AM

Last enriched: 2/27/2026, 10:58:09 AM

Last updated: 3/24/2026, 12:25:08 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses