Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30555: Cross-Site Request Forgery (CSRF) in iiiryan WordPres 同步微博

0
Unknown
VulnerabilityCVE-2025-30555cvecve-2025-30555
Published: Mon Mar 24 2025 (03/24/2025, 13:46:57 UTC)
Source: CVE Database V5
Vendor/Project: iiiryan
Product: WordPres 同步微博

Description

Cross-Site Request Forgery (CSRF) vulnerability in iiiryan WordPres 同步微博 wp2wb allows Stored XSS.This issue affects WordPres 同步微博: from n/a through <= 1.1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 23:54:16 UTC

Technical Analysis

CVE-2025-30555 identifies a security flaw in the iiiryan WordPres 同步微博 plugin, which integrates WordPress with the Weibo social media platform. The vulnerability is a Cross-Site Request Forgery (CSRF) that enables attackers to trick authenticated users into submitting unauthorized requests to the plugin. This CSRF flaw leads to Stored Cross-Site Scripting (XSS), where malicious scripts are permanently stored on the affected site, potentially executing in the browsers of other users or administrators. The plugin versions up to and including 1.1.0 are affected, with no patch currently available. The absence of a CVSS score indicates this is a newly disclosed issue. The attack vector involves an attacker crafting a malicious webpage or email that, when visited by an authenticated user, causes the victim’s browser to send unauthorized requests to the vulnerable plugin. This can result in persistent script injection, enabling session hijacking, defacement, or further malware distribution. The vulnerability impacts the confidentiality, integrity, and availability of affected WordPress sites and their users. No public exploits have been reported yet, but the combination of CSRF and Stored XSS increases the risk of exploitation. The plugin’s focus on Weibo synchronization suggests a user base primarily in Chinese-speaking regions, but WordPress’s global popularity means the threat could extend beyond this demographic if the plugin is used elsewhere.

Potential Impact

The impact of CVE-2025-30555 is significant for organizations using the iiiryan WordPres 同步微博 plugin. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, including administrators, resulting in persistent Stored XSS attacks. This can compromise user sessions, steal sensitive information, deface websites, or distribute malware to site visitors. The persistent nature of Stored XSS increases the attack surface and potential damage. Organizations may face reputational damage, data breaches, and operational disruptions. Since WordPress powers a large portion of the web, any site using this plugin is at risk. The vulnerability could be leveraged in targeted attacks against entities relying on Weibo integration, such as media companies, marketing agencies, or businesses targeting Chinese-speaking audiences. The lack of a patch and public exploits means organizations must act proactively to mitigate risk. The threat also raises concerns about trust in third-party plugins and the need for rigorous security assessments before deployment.

Mitigation Recommendations

To mitigate CVE-2025-30555, organizations should immediately assess their use of the iiiryan WordPres 同步微博 plugin and consider disabling or uninstalling it until a secure patch is released. Implement strict Content Security Policy (CSP) headers to reduce the impact of Stored XSS. Employ anti-CSRF tokens and verify the origin of requests within the plugin code if possible, or apply web application firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin endpoints. Regularly monitor site logs for unusual activities or unauthorized requests. Educate users and administrators about the risks of clicking unknown links while authenticated. Conduct thorough security reviews of all third-party plugins and maintain an inventory to quickly respond to vulnerabilities. Once a patch becomes available, prioritize immediate deployment. Additionally, consider isolating critical WordPress administrative functions behind VPNs or IP whitelisting to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-24T12:59:58.192Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72fae6bfc5ba1deefeb6

Added to database: 4/1/2026, 7:33:14 PM

Last enriched: 4/1/2026, 11:54:16 PM

Last updated: 4/6/2026, 9:15:14 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses