Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14907: CWE-352 Cross-Site Request Forgery (CSRF) in hallsofmontezuma Moderate Selected Posts

0
Medium
VulnerabilityCVE-2025-14907cvecve-2025-14907cwe-352
Published: Sat Jan 24 2026 (01/24/2026, 08:26:33 UTC)
Source: CVE Database V5
Vendor/Project: hallsofmontezuma
Product: Moderate Selected Posts

Description

The Moderate Selected Posts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing nonce verification on the msp_admin_page() function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/01/2026, 08:28:53 UTC

Technical Analysis

CVE-2025-14907 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Moderate Selected Posts plugin for WordPress, developed by hallsofmontezuma. This vulnerability exists in all plugin versions up to and including 1.4 due to the absence of nonce verification in the msp_admin_page() function, which is responsible for handling administrative plugin settings. Nonce verification is a security mechanism used to ensure that requests to change state are intentional and originate from legitimate users. Without this protection, attackers can craft malicious URLs or web pages that, when visited by an authenticated WordPress administrator, cause unintended changes to the plugin’s configuration. The attack vector requires no prior authentication (AV:N) and has low attack complexity (AC:L), but does require user interaction (UI:R), specifically the administrator clicking a malicious link. The vulnerability does not compromise confidentiality or availability but can affect the integrity of the plugin settings, potentially leading to misconfigurations that could be leveraged for further attacks or disruptions. The CVSS v3.1 base score is 4.3, categorized as medium severity. No patches or known exploits are currently reported, but the risk remains significant due to the widespread use of WordPress and the potential for social engineering to facilitate exploitation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the Moderate Selected Posts plugin. Unauthorized changes to plugin settings could lead to altered website behavior, potential exposure to additional vulnerabilities, or disruption of site functionality. While it does not directly compromise sensitive data or site availability, the integrity impact can be a stepping stone for attackers to escalate privileges or implant malicious content. Organizations relying on WordPress for public-facing websites, intranets, or content management should be vigilant. The risk is heightened in sectors with high-value targets such as government, finance, and media, where website integrity is critical. Additionally, the need for administrator interaction means that targeted phishing or social engineering campaigns could facilitate exploitation, increasing the threat to organizations with less mature security awareness programs.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the plugin vendor as soon as they become available. 2. Until patches are released, restrict administrative access to trusted personnel only and enforce multi-factor authentication (MFA) for all WordPress admin accounts to reduce the risk of compromised credentials. 3. Educate WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking on unexpected links or emails. 4. Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF exploitation. 5. Use security plugins that can detect and block suspicious requests or unauthorized changes to plugin settings. 6. Regularly audit WordPress plugin configurations and logs for unauthorized changes or anomalies. 7. Consider temporarily disabling or replacing the Moderate Selected Posts plugin if it is not critical to operations until a secure version is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T18:11:25.932Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974846c4623b1157ca99ecd

Added to database: 1/24/2026, 8:35:56 AM

Last enriched: 2/1/2026, 8:28:53 AM

Last updated: 2/8/2026, 6:59:53 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats