Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25148: Cross-Site Request Forgery (CSRF) in ElbowRobo Read More Copy Link

0
Unknown
VulnerabilityCVE-2025-25148cvecve-2025-25148
Published: Fri Feb 07 2025 (02/07/2025, 10:11:50 UTC)
Source: CVE Database V5
Vendor/Project: ElbowRobo
Product: Read More Copy Link

Description

Cross-Site Request Forgery (CSRF) vulnerability in ElbowRobo Read More Copy Link read-more-copy-link allows Stored XSS.This issue affects Read More Copy Link: from n/a through <= 1.0.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:02:14 UTC

Technical Analysis

CVE-2025-25148 identifies a security vulnerability in the ElbowRobo Read More Copy Link plugin, specifically versions up to 1.0.2. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to perform unauthorized state-changing requests on behalf of authenticated users. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored and executed in the context of users’ browsers. The root cause is the lack of proper CSRF tokens or other anti-CSRF mechanisms in the plugin’s request handling, allowing attackers to craft malicious web requests that the server accepts as legitimate. When exploited, this can lead to session hijacking, data theft, or unauthorized actions performed with the victim’s privileges. The vulnerability affects web applications using the Read More Copy Link plugin, which is often integrated into content management systems or websites to enhance user interaction. Although no public exploits have been reported yet, the combination of CSRF and stored XSS significantly increases the risk profile, as attackers can embed persistent malicious payloads that affect multiple users. The vulnerability was published on February 7, 2025, and no CVSS score has been assigned yet. The absence of patches at the time of reporting means users must rely on temporary mitigations until an official fix is released.

Potential Impact

The impact of CVE-2025-25148 is substantial for organizations using the affected ElbowRobo Read More Copy Link plugin. Exploitation can lead to unauthorized actions performed with the privileges of authenticated users, potentially allowing attackers to manipulate website content, steal sensitive information, or escalate privileges. The stored XSS component means malicious scripts can persist on the site, affecting all visitors and potentially leading to widespread session hijacking, malware distribution, or phishing attacks. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues. Because the vulnerability requires the victim to be authenticated, environments with many logged-in users or administrative users are at higher risk. The lack of known exploits currently limits immediate impact, but the vulnerability’s nature makes it attractive for attackers once weaponized. Organizations relying on this plugin for content management or user interaction face risks to confidentiality, integrity, and availability of their web services.

Mitigation Recommendations

To mitigate CVE-2025-25148, organizations should first monitor for an official patch from ElbowRobo and apply it promptly once available. Until then, implement strict anti-CSRF protections such as verifying CSRF tokens on all state-changing requests within the affected plugin’s scope. Review and harden input validation and output encoding to prevent stored XSS payloads from executing. Restrict plugin usage to trusted users and minimize the number of users with elevated privileges. Employ Content Security Policy (CSP) headers to limit the impact of any injected scripts. Conduct regular security audits and penetration testing focused on CSRF and XSS vectors in the web application. Additionally, educate users about the risks of clicking suspicious links while authenticated. If possible, temporarily disable or replace the vulnerable plugin with a safer alternative until a fix is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-03T13:35:08.294Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7291e6bfc5ba1deeada4

Added to database: 4/1/2026, 7:31:29 PM

Last enriched: 4/1/2026, 10:02:14 PM

Last updated: 4/4/2026, 8:15:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses