Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24756: Cross-Site Request Forgery (CSRF) in mgplugin Roi Calculator

0
Unknown
VulnerabilityCVE-2025-24756cvecve-2025-24756
Published: Fri Jan 24 2025 (01/24/2025, 17:25:19 UTC)
Source: CVE Database V5
Vendor/Project: mgplugin
Product: Roi Calculator

Description

Cross-Site Request Forgery (CSRF) vulnerability in mgplugin Roi Calculator roi-calculator allows Stored XSS.This issue affects Roi Calculator: from n/a through <= 1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:45:17 UTC

Technical Analysis

CVE-2025-24756 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the mgplugin Roi Calculator plugin, which is used to provide ROI calculation functionality within web applications, likely WordPress-based environments. The vulnerability affects all versions up to and including 1.0. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to the web application, exploiting the trust a site has in the user's browser. In this case, the CSRF flaw enables Stored Cross-Site Scripting (XSS), meaning an attacker can inject malicious scripts that persist on the server and execute in the context of other users' browsers. This combination is particularly dangerous because it can lead to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The plugin lacks proper anti-CSRF protections such as synchronizer tokens or same-site cookie attributes. No patches or fixes have been published yet, and no exploits have been observed in the wild, but the vulnerability is publicly disclosed and documented in the CVE database. The absence of a CVSS score requires an assessment based on the nature of the vulnerability, which impacts confidentiality, integrity, and potentially availability through exploitation of stored XSS. The attack does not require user interaction beyond the victim being authenticated and visiting a malicious page, making exploitation feasible in many scenarios.

Potential Impact

The impact of this vulnerability is significant for organizations using the mgplugin Roi Calculator plugin, especially those relying on it for financial or business analytics on their websites. Exploitation could lead to unauthorized actions performed under the guise of legitimate users, including administrators, resulting in data manipulation or leakage. The stored XSS component allows attackers to inject persistent malicious scripts that can steal session cookies, redirect users to phishing sites, or perform other malicious activities, compromising user confidentiality and integrity of the web application. This can damage organizational reputation, lead to regulatory compliance issues, and cause financial losses. Since the vulnerability affects a plugin likely used in WordPress or similar CMS environments, the attack surface is broad, potentially impacting many small to medium enterprises and larger organizations that have integrated this plugin. The lack of known exploits currently reduces immediate risk but does not diminish the urgency of mitigation, as public disclosure often precedes active exploitation. Availability impacts are less direct but could occur if attackers leverage the vulnerability to deface or disrupt services.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their use of the mgplugin Roi Calculator plugin and disable or remove it if not essential. Web administrators should implement robust anti-CSRF protections, including the use of synchronizer tokens or double-submit cookies, to validate the legitimacy of requests. Input validation and output encoding should be enforced to prevent stored XSS payloads from executing. Monitoring web application logs for unusual requests or signs of exploitation attempts is recommended. Since no official patches are available yet, organizations should follow the vendor’s announcements closely and apply updates promptly once released. Additionally, employing Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns can provide interim protection. Educating users about the risks of clicking suspicious links while authenticated can reduce the likelihood of successful CSRF attacks. Finally, conducting regular security assessments and penetration tests on web applications using this plugin will help identify and remediate related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:53:08.866Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7285e6bfc5ba1deeab10

Added to database: 4/1/2026, 7:31:17 PM

Last enriched: 4/1/2026, 9:45:17 PM

Last updated: 4/8/2026, 9:01:25 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses