Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14465: CWE-352 Cross-Site Request Forgery (CSRF) in praveentamil Sticky Action Buttons

0
Medium
VulnerabilityCVE-2025-14465cvecve-2025-14465cwe-352
Published: Wed Jan 07 2026 (01/07/2026, 09:20:59 UTC)
Source: CVE Database V5
Vendor/Project: praveentamil
Product: Sticky Action Buttons

Description

CVE-2025-14465 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions of the WordPress plugin Sticky Action Buttons by praveentamil. The vulnerability arises from missing or incorrect nonce validation in the sabs_options_page_form_submit() function, allowing unauthenticated attackers to trick site administrators into submitting forged requests. Exploitation can lead to unauthorized modification of plugin settings without the administrator's intent. No known exploits are currently reported in the wild. The vulnerability requires user interaction (administrator clicking a malicious link) but no authentication by the attacker. The CVSS score is 4. 3, reflecting limited impact on integrity and no impact on confidentiality or availability. European organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent unauthorized configuration changes that could lead to further compromise or operational issues.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:56:23 UTC

Technical Analysis

CVE-2025-14465 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Sticky Action Buttons WordPress plugin developed by praveentamil. This vulnerability affects all versions up to and including 1.1 due to missing or incorrect nonce validation in the sabs_options_page_form_submit() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from forged sources. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), can alter the plugin’s settings without the administrator’s consent. Since the attacker does not require authentication themselves, the attack vector relies solely on social engineering to induce the administrator to perform the action. The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability directly. The CVSS v3.1 base score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction. No patches or updates have been linked yet, and no known exploits are reported in the wild. This vulnerability could be leveraged as a stepping stone for further attacks if attackers manipulate plugin settings to weaken site security or functionality.

Potential Impact

For European organizations, the impact of CVE-2025-14465 primarily concerns the integrity of WordPress site configurations where the Sticky Action Buttons plugin is installed. Unauthorized changes to plugin settings could lead to degraded site functionality, exposure to further vulnerabilities, or misconfiguration that facilitates additional attacks such as privilege escalation or data manipulation. Organizations relying on WordPress for customer-facing websites, internal portals, or e-commerce platforms may face operational disruptions or reputational damage if attackers exploit this vulnerability. Although the vulnerability does not directly compromise confidentiality or availability, the indirect effects of altered plugin behavior could impact business continuity and trust. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments with less security awareness or where phishing attacks are prevalent. Given WordPress’s popularity in Europe, especially among small and medium enterprises, this vulnerability poses a moderate risk that should be addressed promptly.

Mitigation Recommendations

To mitigate CVE-2025-14465, organizations should first verify if the Sticky Action Buttons plugin is installed and identify the version in use. Since no official patch links are currently available, administrators should consider the following specific actions: 1) Temporarily disable or uninstall the plugin if it is not critical to operations. 2) Restrict administrative access to trusted personnel and enforce strict user awareness training to prevent clicking on suspicious links. 3) Implement web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the plugin’s settings endpoint. 4) Monitor WordPress logs for unusual configuration changes or access patterns. 5) Follow closely for official patches or updates from the plugin developer and apply them immediately upon release. 6) Consider adding custom nonce validation or additional CSRF protections via security plugins or custom code if feasible. 7) Regularly back up WordPress configurations to enable quick restoration if unauthorized changes occur. These measures go beyond generic advice by focusing on immediate risk reduction and detection tailored to this specific plugin vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:09:36.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c147349d0379d7d5810

Added to database: 1/7/2026, 12:05:40 PM

Last enriched: 1/14/2026, 3:56:23 PM

Last updated: 2/5/2026, 2:46:41 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats