Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22325: Cross-Site Request Forgery (CSRF) in nchankov Autocompleter

0
Unknown
VulnerabilityCVE-2025-22325cvecve-2025-22325
Published: Tue Jan 07 2025 (01/07/2025, 10:48:49 UTC)
Source: CVE Database V5
Vendor/Project: nchankov
Product: Autocompleter

Description

Cross-Site Request Forgery (CSRF) vulnerability in nchankov Autocompleter autocompleter allows Stored XSS.This issue affects Autocompleter: from n/a through <= 1.3.5.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 02:23:34 UTC

Technical Analysis

CVE-2025-22325 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the nchankov Autocompleter plugin, specifically affecting versions up to and including 1.3.5.2. The Autocompleter plugin is designed to provide autocomplete functionality for input fields in web applications. The vulnerability arises because the plugin does not adequately verify the origin of requests that modify stored data, allowing attackers to craft malicious requests that execute in the context of an authenticated user session. This CSRF flaw enables attackers to inject malicious scripts that are stored persistently within the application, resulting in Stored Cross-Site Scripting (XSS). Stored XSS can lead to severe consequences such as session hijacking, defacement, or redirection to malicious sites. The absence of a CVSS score indicates that this vulnerability is newly disclosed and not yet fully assessed. No patches or official fixes have been released, and no active exploitation has been reported. The vulnerability affects all versions up to 1.3.5.2, implying that users of this plugin should consider immediate risk mitigation. The attack vector requires the victim to be authenticated and visit a malicious site or click a crafted link, but no additional user interaction beyond that is necessary. The plugin’s widespread use in web applications that rely on autocomplete features increases the potential attack surface. The vulnerability is assigned by Patchstack and published in early 2025, highlighting the need for prompt attention from developers and administrators.

Potential Impact

The impact of CVE-2025-22325 is significant for organizations using the nchankov Autocompleter plugin in their web applications. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users via CSRF, leading to Stored XSS attacks. This can compromise the confidentiality and integrity of user data by enabling session hijacking, theft of credentials, or unauthorized transactions. The availability of the application could also be affected if attackers inject scripts that disrupt normal operations or deface web pages. Since the vulnerability exploits a common web functionality, it can affect a broad range of applications, increasing the risk of widespread compromise. Organizations handling sensitive user information or financial transactions are particularly at risk. The lack of known exploits in the wild currently limits immediate threat but does not reduce the urgency for mitigation. Attackers could develop exploits rapidly once details are public, potentially targeting high-value organizations. The vulnerability’s exploitation requires the victim to be authenticated, which somewhat limits the scope but still poses a critical risk in environments with many active users. Overall, the threat could lead to data breaches, reputational damage, and regulatory consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2025-22325, organizations should first verify if their web applications use the nchankov Autocompleter plugin version 1.3.5.2 or earlier. Immediate steps include implementing anti-CSRF tokens in all state-changing requests to ensure that requests originate from legitimate users. Developers should review and harden the plugin’s request validation mechanisms to prevent unauthorized actions. Input sanitization and output encoding should be enforced rigorously to mitigate Stored XSS risks. Until an official patch is released, consider disabling or replacing the Autocompleter plugin with alternatives that have proper CSRF protections. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts and XSS payloads. Regular security audits and penetration testing should be conducted to identify similar vulnerabilities. User education on avoiding suspicious links and sites can reduce the risk of exploitation. Monitoring logs for unusual activity related to autocomplete features can help detect attempted attacks early. Finally, maintain close communication with the plugin vendor or security community for updates and patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:16:25.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75dae6bfc5ba1df081a7

Added to database: 4/1/2026, 7:45:30 PM

Last enriched: 4/2/2026, 2:23:34 AM

Last updated: 4/6/2026, 10:00:34 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses