CVE-2025-14465: CWE-352 Cross-Site Request Forgery (CSRF) in praveentamil Sticky Action Buttons
CVE-2025-14465 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions of the WordPress plugin Sticky Action Buttons by praveentamil. The vulnerability arises from missing or incorrect nonce validation in the sabs_options_page_form_submit() function, allowing unauthenticated attackers to trick site administrators into submitting forged requests. Exploitation can lead to unauthorized modification of plugin settings without the administrator's intent. No known exploits are currently reported in the wild. The vulnerability requires user interaction (administrator clicking a malicious link) but no authentication by the attacker. The CVSS score is 4. 3, reflecting limited impact on integrity and no impact on confidentiality or availability. European organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent unauthorized configuration changes that could lead to further compromise or operational issues.
AI Analysis
Technical Summary
CVE-2025-14465 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Sticky Action Buttons WordPress plugin developed by praveentamil. This vulnerability affects all versions up to and including 1.1 due to missing or incorrect nonce validation in the sabs_options_page_form_submit() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from forged sources. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), can alter the plugin’s settings without the administrator’s consent. Since the attacker does not require authentication themselves, the attack vector relies solely on social engineering to induce the administrator to perform the action. The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability directly. The CVSS v3.1 base score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction. No patches or updates have been linked yet, and no known exploits are reported in the wild. This vulnerability could be leveraged as a stepping stone for further attacks if attackers manipulate plugin settings to weaken site security or functionality.
Potential Impact
For European organizations, the impact of CVE-2025-14465 primarily concerns the integrity of WordPress site configurations where the Sticky Action Buttons plugin is installed. Unauthorized changes to plugin settings could lead to degraded site functionality, exposure to further vulnerabilities, or misconfiguration that facilitates additional attacks such as privilege escalation or data manipulation. Organizations relying on WordPress for customer-facing websites, internal portals, or e-commerce platforms may face operational disruptions or reputational damage if attackers exploit this vulnerability. Although the vulnerability does not directly compromise confidentiality or availability, the indirect effects of altered plugin behavior could impact business continuity and trust. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments with less security awareness or where phishing attacks are prevalent. Given WordPress’s popularity in Europe, especially among small and medium enterprises, this vulnerability poses a moderate risk that should be addressed promptly.
Mitigation Recommendations
To mitigate CVE-2025-14465, organizations should first verify if the Sticky Action Buttons plugin is installed and identify the version in use. Since no official patch links are currently available, administrators should consider the following specific actions: 1) Temporarily disable or uninstall the plugin if it is not critical to operations. 2) Restrict administrative access to trusted personnel and enforce strict user awareness training to prevent clicking on suspicious links. 3) Implement web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the plugin’s settings endpoint. 4) Monitor WordPress logs for unusual configuration changes or access patterns. 5) Follow closely for official patches or updates from the plugin developer and apply them immediately upon release. 6) Consider adding custom nonce validation or additional CSRF protections via security plugins or custom code if feasible. 7) Regularly back up WordPress configurations to enable quick restoration if unauthorized changes occur. These measures go beyond generic advice by focusing on immediate risk reduction and detection tailored to this specific plugin vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14465: CWE-352 Cross-Site Request Forgery (CSRF) in praveentamil Sticky Action Buttons
Description
CVE-2025-14465 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions of the WordPress plugin Sticky Action Buttons by praveentamil. The vulnerability arises from missing or incorrect nonce validation in the sabs_options_page_form_submit() function, allowing unauthenticated attackers to trick site administrators into submitting forged requests. Exploitation can lead to unauthorized modification of plugin settings without the administrator's intent. No known exploits are currently reported in the wild. The vulnerability requires user interaction (administrator clicking a malicious link) but no authentication by the attacker. The CVSS score is 4. 3, reflecting limited impact on integrity and no impact on confidentiality or availability. European organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent unauthorized configuration changes that could lead to further compromise or operational issues.
AI-Powered Analysis
Technical Analysis
CVE-2025-14465 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Sticky Action Buttons WordPress plugin developed by praveentamil. This vulnerability affects all versions up to and including 1.1 due to missing or incorrect nonce validation in the sabs_options_page_form_submit() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from forged sources. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), can alter the plugin’s settings without the administrator’s consent. Since the attacker does not require authentication themselves, the attack vector relies solely on social engineering to induce the administrator to perform the action. The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability directly. The CVSS v3.1 base score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction. No patches or updates have been linked yet, and no known exploits are reported in the wild. This vulnerability could be leveraged as a stepping stone for further attacks if attackers manipulate plugin settings to weaken site security or functionality.
Potential Impact
For European organizations, the impact of CVE-2025-14465 primarily concerns the integrity of WordPress site configurations where the Sticky Action Buttons plugin is installed. Unauthorized changes to plugin settings could lead to degraded site functionality, exposure to further vulnerabilities, or misconfiguration that facilitates additional attacks such as privilege escalation or data manipulation. Organizations relying on WordPress for customer-facing websites, internal portals, or e-commerce platforms may face operational disruptions or reputational damage if attackers exploit this vulnerability. Although the vulnerability does not directly compromise confidentiality or availability, the indirect effects of altered plugin behavior could impact business continuity and trust. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments with less security awareness or where phishing attacks are prevalent. Given WordPress’s popularity in Europe, especially among small and medium enterprises, this vulnerability poses a moderate risk that should be addressed promptly.
Mitigation Recommendations
To mitigate CVE-2025-14465, organizations should first verify if the Sticky Action Buttons plugin is installed and identify the version in use. Since no official patch links are currently available, administrators should consider the following specific actions: 1) Temporarily disable or uninstall the plugin if it is not critical to operations. 2) Restrict administrative access to trusted personnel and enforce strict user awareness training to prevent clicking on suspicious links. 3) Implement web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the plugin’s settings endpoint. 4) Monitor WordPress logs for unusual configuration changes or access patterns. 5) Follow closely for official patches or updates from the plugin developer and apply them immediately upon release. 6) Consider adding custom nonce validation or additional CSRF protections via security plugins or custom code if feasible. 7) Regularly back up WordPress configurations to enable quick restoration if unauthorized changes occur. These measures go beyond generic advice by focusing on immediate risk reduction and detection tailored to this specific plugin vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T16:09:36.722Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c147349d0379d7d5810
Added to database: 1/7/2026, 12:05:40 PM
Last enriched: 1/14/2026, 3:56:23 PM
Last updated: 2/5/2026, 2:46:41 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.