Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14795: CWE-352 Cross-Site Request Forgery (CSRF) in webguyio Stop Spammers Classic

0
Medium
VulnerabilityCVE-2025-14795cvecve-2025-14795cwe-352
Published: Wed Jan 28 2026 (01/28/2026, 13:26:14 UTC)
Source: CVE Database V5
Vendor/Project: webguyio
Product: Stop Spammers Classic

Description

The Stop Spammers Classic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2026.1. This is due to missing nonce validation in the ss_addtoallowlist class. This makes it possible for unauthenticated attackers to add arbitrary email addresses to the spam allowlist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The vulnerability was partially patched in version 2026.1.

AI-Powered Analysis

AILast updated: 01/28/2026, 13:50:21 UTC

Technical Analysis

CVE-2025-14795 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Stop Spammers Classic plugin for WordPress, a widely used anti-spam tool. The vulnerability exists in all versions up to and including 2026.1 due to missing nonce validation in the ss_addtoallowlist class. Nonce tokens are security measures designed to ensure that requests to perform sensitive actions originate from legitimate users and not from malicious third-party sites. The absence of nonce validation means that an attacker can craft a malicious web request that, when executed by an authenticated site administrator (e.g., by clicking a link), causes the plugin to add arbitrary email addresses to the spam allowlist. This effectively allows attackers to whitelist spam or malicious email addresses, thereby bypassing spam filtering mechanisms. The vulnerability does not impact confidentiality or availability but affects the integrity of the spam filtering process. The CVSS v3.1 score of 4.3 reflects a medium severity, with attack vector being network, no privileges required, low attack complexity, and requiring user interaction. The vulnerability was partially addressed in version 2026.1, but earlier versions remain fully vulnerable. No public exploits have been reported to date. This vulnerability is particularly relevant for WordPress sites that rely on Stop Spammers Classic for spam mitigation, as it can degrade the effectiveness of spam defenses and potentially increase exposure to phishing or spam campaigns.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential degradation of email spam filtering integrity on WordPress sites using the Stop Spammers Classic plugin. By allowing attackers to add arbitrary email addresses to the spam allowlist, malicious actors could facilitate the delivery of phishing emails, malware-laden messages, or other unwanted communications that would otherwise be blocked. This can increase the risk of successful phishing attacks, social engineering, and malware infections, which may lead to data breaches or operational disruptions. While the vulnerability does not directly compromise confidentiality or availability, the indirect effects on organizational security posture can be significant, especially for entities relying heavily on WordPress-based web infrastructure for communications or customer interactions. Additionally, the requirement for administrator interaction means that social engineering tactics could be employed to exploit this vulnerability. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, may face compliance risks if spam or phishing attacks succeed due to this weakness.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately update the Stop Spammers Classic plugin to version 2026.1 or later, where partial patches have been applied; monitor vendor communications for further updates or complete fixes. 2) Implement additional CSRF protections at the WordPress site level, such as enforcing nonce validation for all sensitive actions and using security plugins that provide enhanced request validation. 3) Educate site administrators about the risks of clicking on unsolicited or suspicious links, especially those that could trigger administrative actions. 4) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WordPress plugins. 5) Regularly audit the spam allowlist to detect unauthorized entries and remove suspicious email addresses. 6) Consider restricting administrative access to trusted networks or VPNs to reduce exposure to external CSRF attempts. 7) Monitor logs for unusual administrative actions that could indicate exploitation attempts. These steps go beyond generic advice by focusing on plugin-specific updates, administrative user behavior, and layered defenses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T18:04:36.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a10bc4623b1157cc06b90

Added to database: 1/28/2026, 1:35:56 PM

Last enriched: 1/28/2026, 1:50:21 PM

Last updated: 1/28/2026, 4:11:04 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats