CVE-2025-14907: CWE-352 Cross-Site Request Forgery (CSRF) in hallsofmontezuma Moderate Selected Posts
The Moderate Selected Posts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing nonce verification on the msp_admin_page() function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-14907 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Moderate Selected Posts plugin for WordPress, developed by hallsofmontezuma. This vulnerability exists in all plugin versions up to and including 1.4 due to the absence of nonce verification in the msp_admin_page() function, which is responsible for handling administrative plugin settings. Nonce verification is a security mechanism used to ensure that requests to change state are intentional and originate from legitimate users. Without this protection, attackers can craft malicious URLs or web pages that, when visited by an authenticated WordPress administrator, cause unintended changes to the plugin’s configuration. The attack vector requires no prior authentication (AV:N) and has low attack complexity (AC:L), but does require user interaction (UI:R), specifically the administrator clicking a malicious link. The vulnerability does not compromise confidentiality or availability but can affect the integrity of the plugin settings, potentially leading to misconfigurations that could be leveraged for further attacks or disruptions. The CVSS v3.1 base score is 4.3, categorized as medium severity. No patches or known exploits are currently reported, but the risk remains significant due to the widespread use of WordPress and the potential for social engineering to facilitate exploitation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the Moderate Selected Posts plugin. Unauthorized changes to plugin settings could lead to altered website behavior, potential exposure to additional vulnerabilities, or disruption of site functionality. While it does not directly compromise sensitive data or site availability, the integrity impact can be a stepping stone for attackers to escalate privileges or implant malicious content. Organizations relying on WordPress for public-facing websites, intranets, or content management should be vigilant. The risk is heightened in sectors with high-value targets such as government, finance, and media, where website integrity is critical. Additionally, the need for administrator interaction means that targeted phishing or social engineering campaigns could facilitate exploitation, increasing the threat to organizations with less mature security awareness programs.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the plugin vendor as soon as they become available. 2. Until patches are released, restrict administrative access to trusted personnel only and enforce multi-factor authentication (MFA) for all WordPress admin accounts to reduce the risk of compromised credentials. 3. Educate WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking on unexpected links or emails. 4. Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF exploitation. 5. Use security plugins that can detect and block suspicious requests or unauthorized changes to plugin settings. 6. Regularly audit WordPress plugin configurations and logs for unauthorized changes or anomalies. 7. Consider temporarily disabling or replacing the Moderate Selected Posts plugin if it is not critical to operations until a secure version is available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-14907: CWE-352 Cross-Site Request Forgery (CSRF) in hallsofmontezuma Moderate Selected Posts
Description
The Moderate Selected Posts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing nonce verification on the msp_admin_page() function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-14907 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Moderate Selected Posts plugin for WordPress, developed by hallsofmontezuma. This vulnerability exists in all plugin versions up to and including 1.4 due to the absence of nonce verification in the msp_admin_page() function, which is responsible for handling administrative plugin settings. Nonce verification is a security mechanism used to ensure that requests to change state are intentional and originate from legitimate users. Without this protection, attackers can craft malicious URLs or web pages that, when visited by an authenticated WordPress administrator, cause unintended changes to the plugin’s configuration. The attack vector requires no prior authentication (AV:N) and has low attack complexity (AC:L), but does require user interaction (UI:R), specifically the administrator clicking a malicious link. The vulnerability does not compromise confidentiality or availability but can affect the integrity of the plugin settings, potentially leading to misconfigurations that could be leveraged for further attacks or disruptions. The CVSS v3.1 base score is 4.3, categorized as medium severity. No patches or known exploits are currently reported, but the risk remains significant due to the widespread use of WordPress and the potential for social engineering to facilitate exploitation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the Moderate Selected Posts plugin. Unauthorized changes to plugin settings could lead to altered website behavior, potential exposure to additional vulnerabilities, or disruption of site functionality. While it does not directly compromise sensitive data or site availability, the integrity impact can be a stepping stone for attackers to escalate privileges or implant malicious content. Organizations relying on WordPress for public-facing websites, intranets, or content management should be vigilant. The risk is heightened in sectors with high-value targets such as government, finance, and media, where website integrity is critical. Additionally, the need for administrator interaction means that targeted phishing or social engineering campaigns could facilitate exploitation, increasing the threat to organizations with less mature security awareness programs.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the plugin vendor as soon as they become available. 2. Until patches are released, restrict administrative access to trusted personnel only and enforce multi-factor authentication (MFA) for all WordPress admin accounts to reduce the risk of compromised credentials. 3. Educate WordPress administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking on unexpected links or emails. 4. Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF exploitation. 5. Use security plugins that can detect and block suspicious requests or unauthorized changes to plugin settings. 6. Regularly audit WordPress plugin configurations and logs for unauthorized changes or anomalies. 7. Consider temporarily disabling or replacing the Moderate Selected Posts plugin if it is not critical to operations until a secure version is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-18T18:11:25.932Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974846c4623b1157ca99ecd
Added to database: 1/24/2026, 8:35:56 AM
Last enriched: 2/1/2026, 8:28:53 AM
Last updated: 2/8/2026, 6:59:53 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2138: Buffer Overflow in Tenda TX9
HighCVE-2026-2137: Buffer Overflow in Tenda TX3
HighCVE-2026-2136: SQL Injection in projectworlds Online Food Ordering System
MediumCVE-2026-2135: Command Injection in UTT HiPER 810
MediumCVE-2026-2134: SQL Injection in PHPGurukul Hospital Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.