Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26572: Cross-Site Request Forgery (CSRF) in jesseheap WP PHPList

0
Unknown
VulnerabilityCVE-2025-26572cvecve-2025-26572
Published: Thu Feb 13 2025 (02/13/2025, 13:53:04 UTC)
Source: CVE Database V5
Vendor/Project: jesseheap
Product: WP PHPList

Description

Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList phplist-form-integration allows Cross Site Request Forgery.This issue affects WP PHPList: from n/a through <= 1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:16:36 UTC

Technical Analysis

CVE-2025-26572 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the jesseheap WP PHPList plugin, specifically within the phplist-form-integration module. WP PHPList is a WordPress plugin used to integrate PHPList mailing list functionality into WordPress sites. The vulnerability affects all versions up to and including 1.7. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions on behalf of the user. In this case, the lack of proper CSRF protections in the phplist-form-integration allows attackers to craft malicious web pages or links that, when visited by an authenticated user, can trigger unauthorized actions such as modifying mailing list subscriptions, changing configurations, or sending emails without the user's consent. The vulnerability does not require the attacker to have direct access or credentials, but it does require the victim to be authenticated on the target WordPress site. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability was published on February 13, 2025, and was assigned by Patchstack. The absence of patches or mitigations currently listed indicates that users should be vigilant and implement interim protective measures until an official fix is released.

Potential Impact

The primary impact of this CSRF vulnerability is the potential unauthorized manipulation of mailing list data and configurations within affected WordPress sites using the WP PHPList plugin. Attackers could exploit this to alter subscription statuses, send unauthorized emails, or disrupt mailing list operations, leading to loss of data integrity and potential reputational damage. Organizations relying on WP PHPList for customer communications, marketing campaigns, or internal notifications could experience operational disruptions, unauthorized data changes, or misuse of their mailing infrastructure. This could also lead to compliance issues if unauthorized emails are sent or subscriber data is altered without consent. The vulnerability affects the availability and integrity of mailing list management but does not directly impact confidentiality unless combined with other vulnerabilities. Since exploitation requires the victim to be authenticated, the scope is limited to users with access to the WordPress admin or relevant user roles. However, given the widespread use of WordPress and mailing list plugins, the potential attack surface is significant.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict user roles and permissions to minimize the number of users with access to the WP PHPList plugin features. Implementing web application firewall (WAF) rules to detect and block suspicious CSRF attempts can provide interim protection. Site administrators should enforce strict session management and encourage users to log out when not actively managing the site. Monitoring for unusual mailing list activity or configuration changes can help detect exploitation attempts early. Once available, promptly apply official patches or updates from the jesseheap WP PHPList plugin developers. Additionally, developers and site maintainers should ensure that all forms and state-changing requests include anti-CSRF tokens and validate the origin and referer headers to prevent forged requests. Regular security audits and penetration testing focused on plugin integrations can help identify similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-12T13:58:47.896Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72a7e6bfc5ba1deec859

Added to database: 4/1/2026, 7:31:51 PM

Last enriched: 4/1/2026, 10:16:36 PM

Last updated: 4/6/2026, 11:16:49 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses