CVE-2025-28861: Cross-Site Request Forgery (CSRF) in bhzad WP jQuery Persian Datepicker
Cross-Site Request Forgery (CSRF) vulnerability in bhzad WP jQuery Persian Datepicker wpjqp-datepicker allows Stored XSS.This issue affects WP jQuery Persian Datepicker: from n/a through <= 0.1.0.
AI Analysis
Technical Summary
CVE-2025-28861 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the bhzad WP jQuery Persian Datepicker WordPress plugin, versions up to and including 0.1.0. The vulnerability allows attackers to trick authenticated users into submitting forged requests without their consent, leveraging the victim's credentials and session context. This CSRF flaw can be chained to Stored Cross-Site Scripting (XSS), where malicious scripts are persistently injected into the website's content or database. Stored XSS can lead to session hijacking, credential theft, or further malware distribution. The plugin is designed to provide Persian date-picking functionality in WordPress environments, and its improper request validation or lack of CSRF tokens enables this attack vector. No patches or fixes have been published at the time of disclosure, and no public exploits have been observed in the wild. The vulnerability affects the integrity and confidentiality of affected sites and can degrade availability if exploited for defacement or malware injection. The absence of a CVSS score requires an expert severity assessment based on the attack complexity, impact, and scope.
Potential Impact
The impact of CVE-2025-28861 is significant for organizations using the vulnerable WP jQuery Persian Datepicker plugin. Successful exploitation can lead to unauthorized actions performed in the context of authenticated users, including administrators, resulting in persistent Stored XSS attacks. This can compromise user credentials, enable privilege escalation, and facilitate further attacks such as phishing or malware distribution. The integrity of website content and user data can be compromised, and the confidentiality of user sessions may be breached. Additionally, the presence of persistent XSS can damage organizational reputation and trust. Since WordPress powers a large portion of websites globally, and this plugin targets Persian-speaking user bases, organizations in regions with significant Persian language usage are particularly vulnerable. The lack of a patch increases exposure time, raising the risk of exploitation once public proof-of-concept code or exploits emerge.
Mitigation Recommendations
To mitigate CVE-2025-28861, organizations should immediately audit their WordPress installations for the presence of the bhzad WP jQuery Persian Datepicker plugin and its version. If found, disable or remove the plugin until a security patch is released. Implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns and suspicious POST requests targeting the plugin's endpoints. Enforce strict Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Encourage users and administrators to use multi-factor authentication (MFA) to reduce the risk of session hijacking. Monitor web server and application logs for unusual activities indicative of CSRF or XSS exploitation attempts. Stay updated with vendor advisories and apply patches promptly once available. Additionally, developers should review and enhance the plugin’s code to include anti-CSRF tokens and input sanitization to prevent stored XSS.
Affected Countries
Iran, Afghanistan, Pakistan, United States, Germany, United Kingdom, Canada, Australia, United Arab Emirates, Turkey
CVE-2025-28861: Cross-Site Request Forgery (CSRF) in bhzad WP jQuery Persian Datepicker
Description
Cross-Site Request Forgery (CSRF) vulnerability in bhzad WP jQuery Persian Datepicker wpjqp-datepicker allows Stored XSS.This issue affects WP jQuery Persian Datepicker: from n/a through <= 0.1.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-28861 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the bhzad WP jQuery Persian Datepicker WordPress plugin, versions up to and including 0.1.0. The vulnerability allows attackers to trick authenticated users into submitting forged requests without their consent, leveraging the victim's credentials and session context. This CSRF flaw can be chained to Stored Cross-Site Scripting (XSS), where malicious scripts are persistently injected into the website's content or database. Stored XSS can lead to session hijacking, credential theft, or further malware distribution. The plugin is designed to provide Persian date-picking functionality in WordPress environments, and its improper request validation or lack of CSRF tokens enables this attack vector. No patches or fixes have been published at the time of disclosure, and no public exploits have been observed in the wild. The vulnerability affects the integrity and confidentiality of affected sites and can degrade availability if exploited for defacement or malware injection. The absence of a CVSS score requires an expert severity assessment based on the attack complexity, impact, and scope.
Potential Impact
The impact of CVE-2025-28861 is significant for organizations using the vulnerable WP jQuery Persian Datepicker plugin. Successful exploitation can lead to unauthorized actions performed in the context of authenticated users, including administrators, resulting in persistent Stored XSS attacks. This can compromise user credentials, enable privilege escalation, and facilitate further attacks such as phishing or malware distribution. The integrity of website content and user data can be compromised, and the confidentiality of user sessions may be breached. Additionally, the presence of persistent XSS can damage organizational reputation and trust. Since WordPress powers a large portion of websites globally, and this plugin targets Persian-speaking user bases, organizations in regions with significant Persian language usage are particularly vulnerable. The lack of a patch increases exposure time, raising the risk of exploitation once public proof-of-concept code or exploits emerge.
Mitigation Recommendations
To mitigate CVE-2025-28861, organizations should immediately audit their WordPress installations for the presence of the bhzad WP jQuery Persian Datepicker plugin and its version. If found, disable or remove the plugin until a security patch is released. Implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns and suspicious POST requests targeting the plugin's endpoints. Enforce strict Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Encourage users and administrators to use multi-factor authentication (MFA) to reduce the risk of session hijacking. Monitor web server and application logs for unusual activities indicative of CSRF or XSS exploitation attempts. Stay updated with vendor advisories and apply patches promptly once available. Additionally, developers should review and enhance the plugin’s code to include anti-CSRF tokens and input sanitization to prevent stored XSS.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-03-11T08:08:42.174Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd72e4e6bfc5ba1deef3c7
Added to database: 4/1/2026, 7:32:52 PM
Last enriched: 4/1/2026, 11:26:33 PM
Last updated: 4/4/2026, 8:25:20 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.