CVE-2025-14399: CWE-352 Cross-Site Request Forgery (CSRF) in wpcodefactory Download Plugins and Themes in ZIP from Dashboard
The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `wp-content/uploads/` directory via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-14399 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Download Plugins and Themes in ZIP from Dashboard' affecting all versions up to 1.9.6. The vulnerability stems from missing or incorrect nonce validation in the plugin's 'download_plugin_bulk' and 'download_theme_bulk' functions. Nonces in WordPress are security tokens designed to verify that a request originates from a legitimate user action, preventing unauthorized commands. Due to the absence of proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted page), triggers the plugin to archive all installed plugins and themes into ZIP files and store them in the 'wp-content/uploads/' directory. This action does not require authentication by the attacker but depends on social engineering to induce administrator interaction. The vulnerability does not directly expose sensitive data or cause denial of service but allows unauthorized modification of site files, which could facilitate further exploitation such as planting malicious code or reconnaissance of installed components. The CVSS v3.1 base score is 4.3 (medium), reflecting the lack of confidentiality impact but ease of exploitation with user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of nonce validation in WordPress plugins to prevent CSRF attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of WordPress sites using the affected plugin. Successful exploitation allows attackers to archive and store all plugins and themes without authorization, potentially exposing the site to further attacks such as code injection, malware deployment, or reconnaissance of installed components. While confidentiality and availability impacts are minimal, the unauthorized modification of site content can undermine trust and site stability. Organizations with WordPress-based websites, especially those relying on this plugin for plugin/theme management, may face increased risk if administrators are tricked into executing malicious requests. This could be particularly impactful for businesses in sectors with high web presence such as e-commerce, media, and public services. Additionally, the storage of archives in the uploads directory could lead to storage bloat or accidental exposure if directory listing is enabled. The absence of known exploits reduces immediate urgency but does not eliminate risk, especially given the ease of exploitation via social engineering.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Download Plugins and Themes in ZIP from Dashboard' plugin. If found, they should: 1) Disable or remove the plugin until a security patch is available. 2) Implement strict user training and awareness to prevent administrators from clicking suspicious links or performing unverified actions. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the vulnerable plugin endpoints. 4) Restrict administrative access to trusted networks or via VPN to reduce exposure to CSRF attacks. 5) Monitor the 'wp-content/uploads/' directory for unexpected ZIP archives or file changes that could indicate exploitation attempts. 6) Follow up with the plugin vendor for updates or patches and apply them promptly once released. 7) Consider implementing Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. These steps go beyond generic advice by focusing on detection, access control, and administrator behavior to mitigate exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14399: CWE-352 Cross-Site Request Forgery (CSRF) in wpcodefactory Download Plugins and Themes in ZIP from Dashboard
Description
The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `wp-content/uploads/` directory via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-14399 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Download Plugins and Themes in ZIP from Dashboard' affecting all versions up to 1.9.6. The vulnerability stems from missing or incorrect nonce validation in the plugin's 'download_plugin_bulk' and 'download_theme_bulk' functions. Nonces in WordPress are security tokens designed to verify that a request originates from a legitimate user action, preventing unauthorized commands. Due to the absence of proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted page), triggers the plugin to archive all installed plugins and themes into ZIP files and store them in the 'wp-content/uploads/' directory. This action does not require authentication by the attacker but depends on social engineering to induce administrator interaction. The vulnerability does not directly expose sensitive data or cause denial of service but allows unauthorized modification of site files, which could facilitate further exploitation such as planting malicious code or reconnaissance of installed components. The CVSS v3.1 base score is 4.3 (medium), reflecting the lack of confidentiality impact but ease of exploitation with user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of nonce validation in WordPress plugins to prevent CSRF attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of WordPress sites using the affected plugin. Successful exploitation allows attackers to archive and store all plugins and themes without authorization, potentially exposing the site to further attacks such as code injection, malware deployment, or reconnaissance of installed components. While confidentiality and availability impacts are minimal, the unauthorized modification of site content can undermine trust and site stability. Organizations with WordPress-based websites, especially those relying on this plugin for plugin/theme management, may face increased risk if administrators are tricked into executing malicious requests. This could be particularly impactful for businesses in sectors with high web presence such as e-commerce, media, and public services. Additionally, the storage of archives in the uploads directory could lead to storage bloat or accidental exposure if directory listing is enabled. The absence of known exploits reduces immediate urgency but does not eliminate risk, especially given the ease of exploitation via social engineering.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Download Plugins and Themes in ZIP from Dashboard' plugin. If found, they should: 1) Disable or remove the plugin until a security patch is available. 2) Implement strict user training and awareness to prevent administrators from clicking suspicious links or performing unverified actions. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the vulnerable plugin endpoints. 4) Restrict administrative access to trusted networks or via VPN to reduce exposure to CSRF attacks. 5) Monitor the 'wp-content/uploads/' directory for unexpected ZIP archives or file changes that could indicate exploitation attempts. 6) Follow up with the plugin vendor for updates or patches and apply them promptly once released. 7) Consider implementing Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. These steps go beyond generic advice by focusing on detection, access control, and administrator behavior to mitigate exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T01:12:16.135Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942697da68039dadb6d7568
Added to database: 12/17/2025, 8:27:41 AM
Last enriched: 12/24/2025, 9:29:36 AM
Last updated: 2/6/2026, 5:20:03 AM
Views: 96
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumCVE-2026-25698
LowCVE-2026-25697
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.