Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24720: Cross-Site Request Forgery (CSRF) in Wow-Company Sticky Buttons

0
Unknown
VulnerabilityCVE-2025-24720cvecve-2025-24720
Published: Fri Jan 24 2025 (01/24/2025, 17:25:04 UTC)
Source: CVE Database V5
Vendor/Project: Wow-Company
Product: Sticky Buttons

Description

Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Sticky Buttons sticky-buttons allows Cross Site Request Forgery.This issue affects Sticky Buttons: from n/a through <= 4.1.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:38:24 UTC

Technical Analysis

CVE-2025-24720 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Wow-Company Sticky Buttons plugin, a tool designed to add sticky button functionality to websites. The vulnerability affects all versions up to and including 4.1.1. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting unwanted requests to a web application, exploiting the user's active session and privileges. In this case, the Sticky Buttons plugin does not adequately verify the origin or authenticity of state-changing requests, allowing attackers to craft malicious web pages that, when visited by authenticated users, can trigger unintended actions such as modifying plugin settings or triggering button-related functions. Although no known exploits have been reported in the wild, the lack of a CVSS score indicates the vulnerability is newly disclosed and pending further analysis. The vulnerability impacts the integrity of the affected systems by enabling unauthorized changes and could potentially affect availability if exploited to disrupt normal operations. Exploitation requires the victim to be logged into a system using the vulnerable plugin and to visit a malicious site, making social engineering a key attack vector. The plugin is commonly used in web environments, particularly in CMS platforms, making websites that rely on it susceptible. The absence of patches at the time of disclosure necessitates immediate attention to alternative mitigations such as implementing anti-CSRF tokens, validating HTTP methods, and restricting actions to POST requests with proper authentication checks.

Potential Impact

The primary impact of CVE-2025-24720 is on the integrity and potentially availability of web applications using the vulnerable Sticky Buttons plugin. Attackers can exploit this vulnerability to perform unauthorized actions on behalf of authenticated users, such as altering plugin configurations or triggering button functionalities that could disrupt user experience or site operations. This can lead to unauthorized changes in website behavior, potential defacement, or disruption of critical user interface elements. Organizations relying on this plugin may face reputational damage, loss of user trust, and operational disruptions. Since exploitation requires user interaction and an active session, the scope is limited to users with authenticated access, but the risk remains significant for administrative or privileged users. The lack of known exploits suggests limited immediate threat, but the vulnerability's nature makes it a viable target for attackers employing social engineering. The impact is particularly concerning for websites with high traffic and sensitive user interactions, where unauthorized actions could cascade into broader security issues or compliance violations.

Mitigation Recommendations

To mitigate CVE-2025-24720, organizations should prioritize the following actions: 1) Monitor for and apply official patches or updates from Wow-Company as soon as they become available. 2) Implement anti-CSRF tokens in all forms and state-changing requests within the application to ensure requests are legitimate and originate from authorized users. 3) Enforce strict HTTP method validation by allowing state-changing operations only via POST requests and rejecting GET requests for such actions. 4) Employ Content Security Policy (CSP) headers to restrict the domains that can execute scripts or submit forms, reducing the risk of malicious cross-site requests. 5) Educate users, especially administrators, about the risks of clicking on suspicious links or visiting untrusted websites while authenticated. 6) Review and harden session management to minimize the window of opportunity for CSRF attacks, including implementing short session timeouts and requiring re-authentication for sensitive actions. 7) Conduct regular security assessments and penetration testing focused on CSRF and related web vulnerabilities to identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:52:38.447Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7280e6bfc5ba1deeaa3e

Added to database: 4/1/2026, 7:31:12 PM

Last enriched: 4/1/2026, 9:38:24 PM

Last updated: 4/6/2026, 9:25:16 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses