Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23880: Cross-Site Request Forgery (CSRF) in anmari amr personalise

0
Unknown
VulnerabilityCVE-2025-23880cvecve-2025-23880
Published: Thu Jan 16 2025 (01/16/2025, 20:07:33 UTC)
Source: CVE Database V5
Vendor/Project: anmari
Product: amr personalise

Description

Cross-Site Request Forgery (CSRF) vulnerability in anmari amr personalise amr-personalise allows Cross Site Request Forgery.This issue affects amr personalise: from n/a through <= 2.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 20:28:47 UTC

Technical Analysis

CVE-2025-23880 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the 'anmari amr personalise' plugin, specifically affecting versions up to 2.10. CSRF vulnerabilities occur when a web application does not sufficiently verify that requests originate from legitimate users, allowing attackers to trick authenticated users into submitting unwanted actions. In this case, the plugin fails to implement proper anti-CSRF protections such as synchronizer tokens or origin checks. As a result, an attacker can craft malicious web pages or links that, when visited by an authenticated user, cause the victim's browser to send unauthorized requests to the vulnerable plugin, potentially modifying user settings or personalizing data without consent. Although no known exploits have been reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers. The lack of patches or official fixes at the time of disclosure increases the urgency for organizations to implement interim mitigations. The vulnerability impacts the integrity of user data and may also affect confidentiality if sensitive personalization data is altered or exposed. Exploitation requires the victim to be logged in and to interact with attacker-controlled content, which is a common attack vector in web environments. The plugin is used primarily in WordPress ecosystems, which are widespread globally, increasing the scope of affected systems. The absence of a CVSS score necessitates an expert severity assessment based on the vulnerability's characteristics.

Potential Impact

The primary impact of CVE-2025-23880 is the unauthorized execution of actions within the 'anmari amr personalise' plugin by exploiting the victim's authenticated session. This can lead to unauthorized changes in personalization settings, potentially causing data integrity issues or exposing sensitive user preferences. For organizations, this may result in compromised user trust, data manipulation, and potential downstream effects if personalization influences access controls or content delivery. Since the vulnerability requires user authentication and interaction, the attack surface is limited to active users, but the ease of exploitation via social engineering or malicious websites increases risk. The lack of known exploits currently limits immediate widespread impact, but the public disclosure may prompt attackers to develop exploits. Organizations relying on this plugin for user personalization in their web applications face risks of targeted attacks that could disrupt user experience or lead to further exploitation if combined with other vulnerabilities. The vulnerability does not directly affect availability but could indirectly cause service disruption if exploited at scale or combined with other attack vectors.

Mitigation Recommendations

To mitigate CVE-2025-23880, organizations should first monitor for official patches or updates from the 'anmari' vendor and apply them promptly once available. In the interim, implement strict anti-CSRF protections by integrating synchronizer tokens or verifying the HTTP Referer and Origin headers for all state-changing requests within the plugin. Review and harden user session management to limit the impact of forged requests. Educate users about the risks of interacting with untrusted websites while authenticated on critical systems. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the plugin endpoints. Conduct thorough code reviews and penetration testing focused on CSRF vectors in the affected plugin. If feasible, temporarily disable or replace the plugin with alternatives that have robust security controls until a patch is available. Additionally, implement Content Security Policy (CSP) headers to reduce the risk of malicious content injection and limit the ability of attackers to host malicious CSRF payloads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:31:27.428Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7246e6bfc5ba1dee8e51

Added to database: 4/1/2026, 7:30:14 PM

Last enriched: 4/1/2026, 8:28:47 PM

Last updated: 4/6/2026, 9:32:34 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses