Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24561: Cross-Site Request Forgery (CSRF) in awcode ReviewsTap

0
Unknown
VulnerabilityCVE-2025-24561cvecve-2025-24561
Published: Fri Jan 24 2025 (01/24/2025, 17:24:16 UTC)
Source: CVE Database V5
Vendor/Project: awcode
Product: ReviewsTap

Description

Cross-Site Request Forgery (CSRF) vulnerability in awcode ReviewsTap reviewstap allows Stored XSS.This issue affects ReviewsTap: from n/a through <= 1.1.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:04:08 UTC

Technical Analysis

CVE-2025-24561 identifies a security vulnerability in the awcode ReviewsTap plugin, specifically versions up to 1.1.2. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability that enables attackers to trick authenticated users into submitting unauthorized requests. This CSRF flaw is compounded by the presence of Stored Cross-Site Scripting (XSS), meaning that malicious scripts injected via the exploit are stored persistently within the application’s data, such as user reviews or comments. When other users or administrators access the affected content, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or further malware distribution. The vulnerability arises because the plugin does not adequately verify the origin or authenticity of requests modifying review data, nor does it sanitize input to prevent script injection. Although no CVSS score is assigned yet and no exploits have been observed in the wild, the combination of CSRF and stored XSS is particularly dangerous as it can bypass typical input validation and user interaction requirements. The vulnerability affects all versions of ReviewsTap up to 1.1.2, with no patches currently available. The plugin is typically deployed in web applications that manage user-generated reviews, making it a target for attackers seeking to compromise web platforms and their users.

Potential Impact

The impact of CVE-2025-24561 is significant for organizations using the awcode ReviewsTap plugin. Successful exploitation can lead to persistent XSS attacks, allowing attackers to execute arbitrary JavaScript in the context of users’ browsers. This can result in session hijacking, theft of sensitive information such as authentication tokens, and unauthorized actions performed on behalf of legitimate users. The CSRF aspect means attackers can induce authenticated users to unknowingly submit malicious requests, increasing the attack surface without requiring direct user interaction beyond being logged in. This can compromise the confidentiality and integrity of user data and potentially disrupt availability if malicious scripts perform destructive actions. For organizations relying on ReviewsTap for customer reviews or feedback, this vulnerability could damage reputation, lead to data breaches, and expose users to further attacks. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s nature makes it a high priority for remediation to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-24561, organizations should implement several specific measures: 1) Immediately audit and restrict access to the ReviewsTap plugin to trusted users only, minimizing exposure. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF and XSS payloads targeting review submission endpoints. 3) Enforce strict anti-CSRF tokens on all state-changing requests within the ReviewsTap plugin to ensure requests originate from legitimate users. 4) Sanitize and validate all user inputs rigorously to prevent script injection, using context-aware encoding for stored content. 5) Monitor logs and user activity for unusual patterns indicative of CSRF or XSS exploitation attempts. 6) Engage with the vendor or community to obtain or develop patches addressing the vulnerability and apply them promptly once available. 7) Educate users and administrators about the risks of CSRF and XSS attacks and encourage best practices such as logging out after sessions and avoiding suspicious links. These steps go beyond generic advice by focusing on immediate containment, detection, and input validation tailored to the ReviewsTap environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:50:25.794Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd725be6bfc5ba1dee92ad

Added to database: 4/1/2026, 7:30:35 PM

Last enriched: 4/1/2026, 9:04:08 PM

Last updated: 4/4/2026, 8:17:00 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses