Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24713: Cross-Site Request Forgery (CSRF) in Wow-Company Button Generator – easily Button Builder

0
Unknown
VulnerabilityCVE-2025-24713cvecve-2025-24713
Published: Fri Jan 24 2025 (01/24/2025, 17:25:05 UTC)
Source: CVE Database V5
Vendor/Project: Wow-Company
Product: Button Generator – easily Button Builder

Description

Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder button-generation allows Cross Site Request Forgery.This issue affects Button Generator – easily Button Builder: from n/a through <= 3.1.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:36:49 UTC

Technical Analysis

CVE-2025-24713 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Wow-Company Button Generator – easily Button Builder plugin, versions up to and including 3.1.1. CSRF vulnerabilities occur when a web application does not adequately verify that requests made to it originate from legitimate users, allowing attackers to craft malicious requests that execute actions on behalf of authenticated users without their knowledge. In this case, the plugin's button generation functionality lacks proper CSRF protections, such as anti-CSRF tokens or origin checks, enabling attackers to exploit this weakness. An attacker can create a specially crafted web page or link that, when visited by an authenticated user of a site running the vulnerable plugin, triggers unauthorized actions like modifying button configurations or other administrative tasks. This vulnerability does not require the attacker to have direct access or credentials, but the victim must be logged into the affected site. No patches or fixes have been linked yet, and no known exploits are reported in the wild, but the risk remains significant due to the potential for unauthorized changes and the widespread use of WordPress plugins. The vulnerability was published on January 24, 2025, and assigned by Patchstack, but lacks a CVSS score, indicating it may be newly discovered or under evaluation.

Potential Impact

The primary impact of this CSRF vulnerability is on the integrity and availability of affected websites using the Wow-Company Button Generator plugin. Attackers can perform unauthorized actions such as altering button configurations, potentially defacing websites, disrupting user experience, or injecting malicious content. This can lead to reputational damage, loss of user trust, and potential downstream attacks if malicious buttons redirect users to harmful sites. Since the vulnerability requires the victim to be authenticated, the scope is limited to logged-in users, often administrators or editors, which increases the risk of significant damage if exploited. Organizations relying on this plugin for e-commerce or marketing may face operational disruptions and financial losses. Although no known exploits exist currently, the vulnerability's presence in a widely used plugin makes it a likely target for attackers once exploit code becomes available. The lack of a patch increases exposure time, emphasizing the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-24713, organizations should immediately implement the following measures: 1) Apply any available updates or patches from Wow-Company as soon as they are released to address the CSRF vulnerability. 2) If patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious CSRF-like requests targeting the plugin's endpoints. 3) Enforce strict user session management and limit administrative access to trusted users only, reducing the risk of exploitation via compromised accounts. 4) Employ anti-CSRF tokens or nonce validation in custom plugin code or through plugin configuration if supported. 5) Educate users and administrators about the risks of clicking unknown links while authenticated on administrative interfaces. 6) Monitor logs for unusual POST requests or changes to button configurations that could indicate attempted exploitation. 7) Consider temporarily disabling the plugin if it is not critical to operations until a secure version is available. These steps go beyond generic advice by focusing on proactive monitoring, access control, and temporary risk reduction.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:52:38.446Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd727fe6bfc5ba1deeaa1f

Added to database: 4/1/2026, 7:31:11 PM

Last enriched: 4/1/2026, 9:36:49 PM

Last updated: 4/6/2026, 11:08:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses