Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22347: Cross-Site Request Forgery (CSRF) in bannersky BSK Forms Blacklist

0
Unknown
VulnerabilityCVE-2025-22347cvecve-2025-22347
Published: Tue Jan 07 2025 (01/07/2025, 10:48:42 UTC)
Source: CVE Database V5
Vendor/Project: bannersky
Product: BSK Forms Blacklist

Description

Cross-Site Request Forgery (CSRF) vulnerability in bannersky BSK Forms Blacklist bsk-gravityforms-blacklist allows Blind SQL Injection.This issue affects BSK Forms Blacklist: from n/a through <= 3.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 02:09:46 UTC

Technical Analysis

CVE-2025-22347 identifies a security vulnerability in the bannersky BSK Forms Blacklist plugin, specifically versions up to 3.9. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables an attacker to perform Blind SQL Injection attacks against the backend database. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests, which in this case leads to SQL injection. Blind SQL Injection means the attacker can infer database information by sending crafted requests and analyzing responses or behavior, even without direct error messages. This combination is particularly dangerous because it bypasses normal input validation and authentication controls, allowing unauthorized data access or manipulation. The vulnerability affects the plugin’s handling of blacklist forms, which are commonly used to filter or block unwanted inputs. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved and published in early January 2025, indicating recent discovery. The absence of a CVSS score requires an assessment based on impact and exploitability factors.

Potential Impact

The impact of this vulnerability is significant for organizations using the bannersky BSK Forms Blacklist plugin on their websites. Successful exploitation can lead to unauthorized database queries, potentially exposing sensitive data such as user credentials, personal information, or business-critical data. It can also allow attackers to modify or delete data, undermining data integrity. The CSRF vector means that attackers can exploit the vulnerability remotely by tricking authenticated users into visiting malicious web pages, increasing the attack surface. This can lead to data breaches, loss of customer trust, regulatory penalties, and operational disruptions. Organizations relying on this plugin for input filtering may find their defenses bypassed, increasing exposure to further attacks. The lack of known exploits in the wild suggests limited current exploitation but also indicates a window of opportunity for attackers. The threat is particularly relevant for websites with high traffic, sensitive data, or those in regulated industries.

Mitigation Recommendations

Organizations should immediately review their use of the bannersky BSK Forms Blacklist plugin and plan to update to a patched version once available. In the absence of a patch, implement strict CSRF protections such as requiring anti-CSRF tokens on all form submissions and validating the origin of requests. Disable or restrict the plugin’s functionality if feasible until a fix is applied. Employ web application firewalls (WAFs) with rules to detect and block suspicious SQL injection patterns and CSRF attempts targeting the affected plugin endpoints. Conduct thorough security testing and code reviews to identify and remediate similar vulnerabilities. Educate users and administrators about the risks of CSRF and encourage cautious behavior regarding unsolicited links. Monitor web server and application logs for unusual activity indicative of exploitation attempts. Finally, maintain regular backups and incident response plans to minimize damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:16:49.450Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75dde6bfc5ba1df082dd

Added to database: 4/1/2026, 7:45:33 PM

Last enriched: 4/2/2026, 2:09:46 AM

Last updated: 4/6/2026, 11:01:16 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses