Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14465: CWE-352 Cross-Site Request Forgery (CSRF) in praveentamil Sticky Action Buttons

0
Medium
VulnerabilityCVE-2025-14465cvecve-2025-14465cwe-352
Published: Wed Jan 07 2026 (01/07/2026, 09:20:59 UTC)
Source: CVE Database V5
Vendor/Project: praveentamil
Product: Sticky Action Buttons

Description

The Sticky Action Buttons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the sabs_options_page_form_submit() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:20:45 UTC

Technical Analysis

The Sticky Action Buttons WordPress plugin, developed by praveentamil, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14465. This vulnerability exists in all versions up to and including 1.1 due to improper or missing nonce validation in the sabs_options_page_form_submit() function, which handles form submissions for plugin settings. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third-party sites. The absence or incorrect implementation of nonce checks allows an attacker to craft a malicious web page or email that, when visited or clicked by a site administrator, causes the administrator's browser to submit unauthorized requests to the vulnerable WordPress site. This can result in unauthorized changes to the plugin's configuration, potentially altering site behavior or enabling further attacks. The attack does not require the attacker to be authenticated but does require the administrator's interaction (clicking a link or visiting a page). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects network attack vector, low complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No public exploits have been reported, but the vulnerability poses a risk to sites running the affected plugin versions. The vulnerability was reserved in December 2025 and published in January 2026, with Wordfence as the assigner. No official patches or updates have been linked yet, indicating the need for immediate attention by site administrators.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of plugin settings, which affects the integrity of the affected WordPress sites. While it does not directly compromise confidentiality or availability, changes to plugin settings could lead to unintended site behavior, degraded user experience, or create conditions favorable for further exploitation. For organizations relying on Sticky Action Buttons for critical site functionality or user interaction, unauthorized configuration changes could disrupt business operations or damage reputation. Since exploitation requires administrator interaction, the risk is somewhat mitigated but remains significant in environments with multiple administrators or less security-aware personnel. The vulnerability could be leveraged as part of a broader attack chain, potentially enabling privilege escalation or persistent site manipulation. Given WordPress's widespread use globally, especially in small to medium enterprises and content-driven websites, the impact could be widespread if not addressed promptly.

Mitigation Recommendations

1. Immediately update the Sticky Action Buttons plugin to a version that includes proper nonce validation once available from the vendor. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block suspicious requests targeting the sabs_options_page_form_submit() endpoint or unusual POST requests modifying plugin settings. 3. Educate site administrators about the risks of clicking on unsolicited or suspicious links, especially when logged into WordPress admin panels. 4. Restrict administrative access to trusted networks or use VPNs to reduce exposure to CSRF attacks. 5. Employ security plugins that add additional CSRF protections or monitor for unauthorized configuration changes. 6. Regularly audit plugin settings and WordPress logs for unexpected changes or access patterns. 7. Consider disabling or removing the Sticky Action Buttons plugin if it is not essential to reduce attack surface. 8. Implement Content Security Policy (CSP) headers to limit the ability of malicious sites to perform CSRF attacks. These steps go beyond generic advice by focusing on interim protective controls and administrator behavior to mitigate risk until official patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:09:36.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c147349d0379d7d5810

Added to database: 1/7/2026, 12:05:40 PM

Last enriched: 2/27/2026, 11:20:45 AM

Last updated: 3/24/2026, 9:26:33 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses