Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14167: CWE-352 Cross-Site Request Forgery (CSRF) in akshayshah5189 Remove Post Type Slug

0
Medium
VulnerabilityCVE-2025-14167cvecve-2025-14167cwe-352
Published: Thu Feb 19 2026 (02/19/2026, 04:36:21 UTC)
Source: CVE Database V5
Vendor/Project: akshayshah5189
Product: Remove Post Type Slug

Description

The Remove Post Type Slug plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to incorrect nonce validation logic that uses OR (||) instead of AND (&&), causing the validation to fail when the nonce field is not empty OR when verification fails, rather than when it's empty AND verification fails. This makes it possible for unauthenticated attackers to modify the plugin's post type slug removal settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:03:18 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14167 affects the 'Remove Post Type Slug' WordPress plugin developed by akshayshah5189, present in all versions up to and including 1.0.2. The core issue is a flawed nonce validation mechanism used to protect against CSRF attacks. Specifically, the plugin's code uses a logical OR (||) operator instead of the correct logical AND (&&) when validating the nonce field. This logic error causes the validation to fail only if the nonce field is empty AND verification fails, rather than failing if either condition is true. Consequently, an attacker can craft a malicious request that appears valid to the server, bypassing the CSRF protection. Since the plugin controls the removal of post type slugs, an attacker can modify these settings without authentication if they can trick an administrator into clicking a specially crafted link. This attack vector requires user interaction but no prior authentication or elevated privileges. The vulnerability impacts the integrity of the WordPress site's configuration by allowing unauthorized changes to URL structures, which can affect SEO, site navigation, and potentially expose the site to further attacks. The CVSS 3.1 base score is 4.3, reflecting a medium severity rating due to the need for user interaction and limited impact scope. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly.

Potential Impact

The primary impact of CVE-2025-14167 is on the integrity of WordPress site configurations that use the 'Remove Post Type Slug' plugin. Unauthorized modification of post type slug removal settings can disrupt site URL structures, potentially breaking links, harming SEO rankings, and confusing site visitors. While this does not directly compromise confidentiality or availability, altered URL structures can facilitate further attacks such as phishing or content spoofing by making URLs less predictable or consistent. Organizations relying on this plugin risk unauthorized configuration changes if administrators are tricked into clicking malicious links, which could lead to downtime or reputational damage. The vulnerability is particularly concerning for high-traffic websites, e-commerce platforms, and content-heavy sites where URL integrity is critical. Since exploitation requires user interaction from an administrator, the risk is somewhat mitigated but remains significant in environments with less security awareness or where phishing attacks are common.

Mitigation Recommendations

To mitigate CVE-2025-14167, site administrators should immediately update the 'Remove Post Type Slug' plugin once a patched version is released that corrects the nonce validation logic to use a logical AND (&&) instead of OR (||). Until a patch is available, administrators can manually review and correct the plugin's nonce validation code to ensure proper logic. Additionally, restricting administrative access to trusted networks or using multi-factor authentication can reduce the risk of successful exploitation. Educating administrators about phishing and social engineering risks is critical to prevent them from clicking malicious links. Implementing Content Security Policy (CSP) and SameSite cookie attributes can further reduce CSRF risks. Regularly auditing plugin usage and minimizing the number of installed plugins reduces the attack surface. Monitoring logs for unusual configuration changes can help detect exploitation attempts early. Finally, consider temporarily disabling the plugin if it is not essential to site functionality until a secure version is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T21:23:32.778Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f36aea4a407a3be05e

Added to database: 2/19/2026, 4:56:19 AM

Last enriched: 2/28/2026, 1:03:18 PM

Last updated: 4/4/2026, 11:26:51 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses