Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23804: Cross-Site Request Forgery (CSRF) in Shiv Prakash Tiwari WP Service Payment Form With Authorize.net

0
Unknown
VulnerabilityCVE-2025-23804cvecve-2025-23804
Published: Thu Jan 16 2025 (01/16/2025, 20:07:06 UTC)
Source: CVE Database V5
Vendor/Project: Shiv Prakash Tiwari
Product: WP Service Payment Form With Authorize.net

Description

Cross-Site Request Forgery (CSRF) vulnerability in Shiv Prakash Tiwari WP Service Payment Form With Authorize.net wp-service-payment-form-with-authorizenet allows Reflected XSS.This issue affects WP Service Payment Form With Authorize.net: from n/a through <= 2.6.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 20:11:32 UTC

Technical Analysis

CVE-2025-23804 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'WP Service Payment Form With Authorize.net' developed by Shiv Prakash Tiwari, affecting versions up to and including 2.6.0. This plugin integrates Authorize.net payment processing into WordPress sites, enabling service payments through a form. The vulnerability arises due to insufficient or missing CSRF protections on the payment form, allowing an attacker to craft malicious requests that, when executed by an authenticated user, can trigger unintended payment transactions or modify payment-related data without the user's consent. Furthermore, the vulnerability is associated with reflected Cross-Site Scripting (XSS), which can be exploited to inject malicious scripts into the victim's browser, potentially leading to session hijacking, credential theft, or redirection to malicious websites. The combination of CSRF and reflected XSS increases the attack surface and complexity of exploitation. Although no known exploits are currently reported in the wild, the presence of these vulnerabilities in a payment processing context poses a significant risk. The plugin's widespread use in WordPress e-commerce sites amplifies the threat, especially where payment integrity and user authentication are critical. The vulnerability was published on January 16, 2025, and no CVSS score has been assigned yet. The lack of patches or official fixes at the time of reporting necessitates immediate attention from site administrators.

Potential Impact

The impact of CVE-2025-23804 is considerable for organizations relying on the affected WordPress plugin for processing payments via Authorize.net. Successful exploitation can lead to unauthorized payment transactions, financial fraud, and manipulation of payment data, undermining the integrity and trustworthiness of the payment system. The reflected XSS component can facilitate further attacks such as session hijacking, credential theft, or distribution of malware, potentially compromising user accounts and sensitive information. This can result in financial losses, reputational damage, regulatory penalties, and erosion of customer trust. E-commerce platforms, service providers, and any organization using this plugin are at risk of operational disruption and data breaches. The attack does not require advanced privileges beyond an authenticated user session, making it easier for attackers to exploit if users are logged in. The scope of affected systems is limited to WordPress sites using this specific plugin, but given WordPress's large market share, the number of potentially vulnerable sites is significant. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-23804, organizations should first monitor for official patches or updates from the plugin developer and apply them promptly once available. In the absence of an official fix, site administrators should implement manual CSRF protections by adding unique, unpredictable CSRF tokens to all forms handling payment requests and verifying these tokens server-side before processing any actions. Input validation and output encoding should be enforced rigorously to prevent reflected XSS attacks, including sanitizing all user-supplied input and HTTP parameters. Restricting the plugin's usage to trusted users and minimizing the number of authenticated users with payment privileges can reduce risk. Employing Web Application Firewalls (WAFs) with rules targeting CSRF and XSS attack patterns can provide an additional layer of defense. Regular security audits and penetration testing focused on the payment form and related workflows are recommended to detect and remediate vulnerabilities proactively. Finally, educating users about the risks of phishing and social engineering that could facilitate CSRF attacks is important to reduce the likelihood of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:30:28.608Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7238e6bfc5ba1dee87ad

Added to database: 4/1/2026, 7:30:00 PM

Last enriched: 4/1/2026, 8:11:32 PM

Last updated: 4/6/2026, 9:31:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses