Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14162: CWE-352 Cross-Site Request Forgery (CSRF) in magblogapi BMLT WordPress Plugin

0
Medium
VulnerabilityCVE-2025-14162cvecve-2025-14162cwe-352
Published: Fri Dec 12 2025 (12/12/2025, 03:20:36 UTC)
Source: CVE Database V5
Vendor/Project: magblogapi
Product: BMLT WordPress Plugin

Description

The BMLT WordPress Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.11.4. This is due to missing nonce validation on the 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option ' action. This makes it possible for unauthenticated attackers to create new plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:04:55 UTC

Technical Analysis

The BMLT WordPress Plugin, developed by magblogapi, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14162. This vulnerability exists in all versions up to and including 3.11.4 due to the absence of nonce validation on two key actions: 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option'. Nonce validation is a security mechanism designed to ensure that requests to change state originate from legitimate users and not from forged requests. Without this protection, an attacker can craft a malicious link or webpage that, when visited by a site administrator, triggers unauthorized creation or deletion of plugin settings. The attack vector requires no authentication but does require the administrator to interact with the malicious content (UI:R). The CVSS 3.1 base score is 4.3 (medium severity), reflecting the lack of confidentiality or availability impact but acknowledging the integrity impact on plugin settings. Although no public exploits have been reported, the vulnerability could be leveraged as a foothold for further attacks or to disrupt site functionality. The plugin is commonly used in WordPress environments, which are prevalent across many organizations, making this a relevant threat to sites using this plugin.

Potential Impact

For European organizations, exploitation of this CSRF vulnerability could lead to unauthorized modification of plugin settings, potentially undermining the integrity of the affected WordPress site. While it does not directly compromise confidentiality or availability, altered plugin configurations could enable further malicious activities such as privilege escalation, data manipulation, or service disruption. Organizations relying on the BMLT plugin for critical functions may experience operational impacts if attackers manipulate settings to disable features or introduce malicious behavior. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. Given the widespread use of WordPress in Europe, especially among SMEs and community organizations, the vulnerability could affect a broad range of entities if unaddressed.

Mitigation Recommendations

To mitigate this vulnerability, affected organizations should immediately update the BMLT WordPress Plugin to a patched version once available. In the absence of an official patch, administrators should implement manual nonce validation on the 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option' actions by modifying the plugin code to verify nonces before processing requests. Additionally, organizations should enforce strict administrative access controls and educate administrators about the risks of clicking on untrusted links. Employing web application firewalls (WAFs) with CSRF protection rules can help detect and block suspicious requests. Regularly auditing plugin configurations and monitoring logs for unusual changes can also aid in early detection of exploitation attempts. Finally, limiting plugin use to trusted environments and minimizing the number of administrators can reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T20:46:00.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b918b650da22753edbe34

Added to database: 12/12/2025, 3:52:43 AM

Last enriched: 12/19/2025, 5:04:55 AM

Last updated: 2/7/2026, 11:04:44 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats