CVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to inverted nonce verification logic in the amp_theme_ajaxcomments AJAX handler, which rejects requests with VALID nonces and accepts requests with MISSING or INVALID nonces. This makes it possible for unauthenticated attackers to submit comments on behalf of logged-in users via a forged request granted they can trick a user into performing an action such as clicking on a link, and the plugin's template mode is enabled.
AI Analysis
Technical Summary
CVE-2025-14468 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, affecting all versions up to and including 1.1.9. The root cause is an inverted nonce verification logic within the amp_theme_ajaxcomments AJAX handler: instead of accepting requests with valid nonces and rejecting those with invalid or missing nonces, the handler erroneously rejects valid nonces and accepts invalid or missing ones. Nonces in WordPress are security tokens used to validate that requests originate from legitimate users and prevent CSRF attacks. Due to this inversion, an attacker can craft a malicious request that submits comments on behalf of authenticated users without their consent, provided the user is logged in and can be tricked into clicking a specially crafted link. This attack vector requires user interaction but no authentication on the attacker’s part. The vulnerability is only exploitable if the plugin’s template mode is enabled, which is a configuration setting within AMP for WP. The impact is limited to integrity, as unauthorized comments can be injected, potentially leading to spam, misinformation, or reputational harm. Confidentiality and availability are not affected. The CVSS v3.1 base score is 4.3, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, user interaction required, and scope unchanged. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. Organizations using this plugin should verify their version and configuration to assess exposure.
Potential Impact
For European organizations running WordPress sites with the AMP for WP plugin, this vulnerability poses a risk primarily to the integrity of website content. Unauthorized comment submissions can lead to spam, phishing links, or misinformation being posted under legitimate user sessions, potentially damaging brand reputation and user trust. While the vulnerability does not compromise sensitive data confidentiality or site availability, the injection of malicious comments can be leveraged for social engineering or to distribute malware links. Organizations in sectors with high public engagement, such as media, e-commerce, and government, may face increased reputational risks. Additionally, regulatory frameworks like GDPR emphasize data integrity and user trust, so exploitation could indirectly lead to compliance concerns if user accounts are misused or if malicious content harms users. The requirement for user interaction and the need for the plugin’s template mode to be enabled somewhat limit the attack surface, but the widespread use of WordPress and AMP for WP in Europe means many sites could be affected if not remediated promptly.
Mitigation Recommendations
1. Immediately verify the version of AMP for WP installed and upgrade to a patched version once available. Since no patch links are currently provided, monitor vendor announcements closely. 2. If upgrading is not immediately possible, disable the plugin’s template mode to prevent exploitation, as the vulnerability requires this mode to be enabled. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX comment submissions lacking valid nonces or originating from unusual referrers. 4. Educate users and administrators about the risk of clicking unsolicited links that could trigger CSRF attacks. 5. Regularly audit comment submissions for unusual patterns indicative of automated or unauthorized posts. 6. Consider temporarily disabling comment functionality or restricting comment posting to authenticated users with additional verification until the vulnerability is resolved. 7. Employ security plugins that can enforce stricter nonce validation or add additional CSRF protections on AJAX handlers. 8. Monitor security advisories from WordPress and the plugin developer for updates or patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
Description
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to inverted nonce verification logic in the amp_theme_ajaxcomments AJAX handler, which rejects requests with VALID nonces and accepts requests with MISSING or INVALID nonces. This makes it possible for unauthenticated attackers to submit comments on behalf of logged-in users via a forged request granted they can trick a user into performing an action such as clicking on a link, and the plugin's template mode is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-14468 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, affecting all versions up to and including 1.1.9. The root cause is an inverted nonce verification logic within the amp_theme_ajaxcomments AJAX handler: instead of accepting requests with valid nonces and rejecting those with invalid or missing nonces, the handler erroneously rejects valid nonces and accepts invalid or missing ones. Nonces in WordPress are security tokens used to validate that requests originate from legitimate users and prevent CSRF attacks. Due to this inversion, an attacker can craft a malicious request that submits comments on behalf of authenticated users without their consent, provided the user is logged in and can be tricked into clicking a specially crafted link. This attack vector requires user interaction but no authentication on the attacker’s part. The vulnerability is only exploitable if the plugin’s template mode is enabled, which is a configuration setting within AMP for WP. The impact is limited to integrity, as unauthorized comments can be injected, potentially leading to spam, misinformation, or reputational harm. Confidentiality and availability are not affected. The CVSS v3.1 base score is 4.3, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, user interaction required, and scope unchanged. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. Organizations using this plugin should verify their version and configuration to assess exposure.
Potential Impact
For European organizations running WordPress sites with the AMP for WP plugin, this vulnerability poses a risk primarily to the integrity of website content. Unauthorized comment submissions can lead to spam, phishing links, or misinformation being posted under legitimate user sessions, potentially damaging brand reputation and user trust. While the vulnerability does not compromise sensitive data confidentiality or site availability, the injection of malicious comments can be leveraged for social engineering or to distribute malware links. Organizations in sectors with high public engagement, such as media, e-commerce, and government, may face increased reputational risks. Additionally, regulatory frameworks like GDPR emphasize data integrity and user trust, so exploitation could indirectly lead to compliance concerns if user accounts are misused or if malicious content harms users. The requirement for user interaction and the need for the plugin’s template mode to be enabled somewhat limit the attack surface, but the widespread use of WordPress and AMP for WP in Europe means many sites could be affected if not remediated promptly.
Mitigation Recommendations
1. Immediately verify the version of AMP for WP installed and upgrade to a patched version once available. Since no patch links are currently provided, monitor vendor announcements closely. 2. If upgrading is not immediately possible, disable the plugin’s template mode to prevent exploitation, as the vulnerability requires this mode to be enabled. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX comment submissions lacking valid nonces or originating from unusual referrers. 4. Educate users and administrators about the risk of clicking unsolicited links that could trigger CSRF attacks. 5. Regularly audit comment submissions for unusual patterns indicative of automated or unauthorized posts. 6. Consider temporarily disabling comment functionality or restricting comment posting to authenticated users with additional verification until the vulnerability is resolved. 7. Employ security plugins that can enforce stricter nonce validation or add additional CSRF protections on AJAX handlers. 8. Monitor security advisories from WordPress and the plugin developer for updates or patches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T16:39:16.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695de67ca55ed4ed995516f1
Added to database: 1/7/2026, 4:52:12 AM
Last enriched: 1/7/2026, 4:59:39 AM
Last updated: 1/8/2026, 5:18:49 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.