Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14399: CWE-352 Cross-Site Request Forgery (CSRF) in wpcodefactory Download Plugins and Themes in ZIP from Dashboard

0
Medium
VulnerabilityCVE-2025-14399cvecve-2025-14399cwe-352
Published: Wed Dec 17 2025 (12/17/2025, 07:21:02 UTC)
Source: CVE Database V5
Vendor/Project: wpcodefactory
Product: Download Plugins and Themes in ZIP from Dashboard

Description

The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `wp-content/uploads/` directory via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/24/2025, 09:29:36 UTC

Technical Analysis

CVE-2025-14399 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Download Plugins and Themes in ZIP from Dashboard' affecting all versions up to 1.9.6. The vulnerability stems from missing or incorrect nonce validation in the plugin's 'download_plugin_bulk' and 'download_theme_bulk' functions. Nonces in WordPress are security tokens designed to verify that a request originates from a legitimate user action, preventing unauthorized commands. Due to the absence of proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted page), triggers the plugin to archive all installed plugins and themes into ZIP files and store them in the 'wp-content/uploads/' directory. This action does not require authentication by the attacker but depends on social engineering to induce administrator interaction. The vulnerability does not directly expose sensitive data or cause denial of service but allows unauthorized modification of site files, which could facilitate further exploitation such as planting malicious code or reconnaissance of installed components. The CVSS v3.1 base score is 4.3 (medium), reflecting the lack of confidentiality impact but ease of exploitation with user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of nonce validation in WordPress plugins to prevent CSRF attacks.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of WordPress sites using the affected plugin. Successful exploitation allows attackers to archive and store all plugins and themes without authorization, potentially exposing the site to further attacks such as code injection, malware deployment, or reconnaissance of installed components. While confidentiality and availability impacts are minimal, the unauthorized modification of site content can undermine trust and site stability. Organizations with WordPress-based websites, especially those relying on this plugin for plugin/theme management, may face increased risk if administrators are tricked into executing malicious requests. This could be particularly impactful for businesses in sectors with high web presence such as e-commerce, media, and public services. Additionally, the storage of archives in the uploads directory could lead to storage bloat or accidental exposure if directory listing is enabled. The absence of known exploits reduces immediate urgency but does not eliminate risk, especially given the ease of exploitation via social engineering.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the 'Download Plugins and Themes in ZIP from Dashboard' plugin. If found, they should: 1) Disable or remove the plugin until a security patch is available. 2) Implement strict user training and awareness to prevent administrators from clicking suspicious links or performing unverified actions. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the vulnerable plugin endpoints. 4) Restrict administrative access to trusted networks or via VPN to reduce exposure to CSRF attacks. 5) Monitor the 'wp-content/uploads/' directory for unexpected ZIP archives or file changes that could indicate exploitation attempts. 6) Follow up with the plugin vendor for updates or patches and apply them promptly once released. 7) Consider implementing Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. These steps go beyond generic advice by focusing on detection, access control, and administrator behavior to mitigate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T01:12:16.135Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942697da68039dadb6d7568

Added to database: 12/17/2025, 8:27:41 AM

Last enriched: 12/24/2025, 9:29:36 AM

Last updated: 2/6/2026, 5:20:03 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats