Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30912: Cross-Site Request Forgery (CSRF) in Wow-Company Float menu

0
Unknown
VulnerabilityCVE-2025-30912cvecve-2025-30912
Published: Thu Mar 27 2025 (03/27/2025, 10:55:53 UTC)
Source: CVE Database V5
Vendor/Project: Wow-Company
Product: Float menu

Description

Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu float-menu allows Cross Site Request Forgery.This issue affects Float menu: from n/a through <= 6.1.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:42:54 UTC

Technical Analysis

CVE-2025-30912 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Wow-Company Float menu plugin, affecting all versions up to 6.1.2. CSRF vulnerabilities occur when a web application does not adequately verify that state-changing requests originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable site. In this case, the Float menu plugin fails to implement sufficient anti-CSRF protections such as tokens or origin checks. This flaw can be exploited by attackers to perform unauthorized operations within the context of a logged-in user, potentially modifying settings or data controlled by the plugin. The vulnerability does not require the attacker to have direct access to the victim’s credentials but relies on the victim being authenticated and visiting a malicious site. No public exploits have been reported yet, and no CVSS score has been assigned. The vulnerability affects a widely used web interface component, which may be integrated into various web applications or content management systems. The absence of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps. The vulnerability’s impact is limited to the scope of the Float menu’s functionality but can lead to unauthorized changes or disruptions in user experience and application behavior.

Potential Impact

The primary impact of this CSRF vulnerability is unauthorized state-changing actions performed by attackers leveraging authenticated user sessions. This can lead to unauthorized configuration changes, data manipulation, or disruption of normal operations within applications using the Float menu plugin. While it does not directly lead to data disclosure or remote code execution, the ability to perform actions without user consent can compromise the integrity and availability of affected systems. Organizations relying on this plugin in customer-facing or internal web applications may face risks including defacement, unauthorized feature toggling, or other malicious modifications. The impact is amplified in environments where users have elevated privileges or where the plugin controls critical functionality. Additionally, exploitation could facilitate further attacks by altering application behavior or weakening security controls. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after vulnerability publication. Overall, the vulnerability poses a moderate risk to confidentiality, integrity, and availability depending on the deployment context.

Mitigation Recommendations

To mitigate CVE-2025-30912, organizations should first monitor for an official patch from Wow-Company and apply it promptly once available. In the interim, implement strict anti-CSRF protections by ensuring that all state-changing requests require a unique, unpredictable token validated on the server side. Web application firewalls (WAFs) can be configured to detect and block suspicious cross-origin requests targeting the Float menu endpoints. Restricting the HTTP methods allowed for sensitive operations (e.g., enforcing POST over GET) can reduce exposure. Educate users to avoid clicking on untrusted links while authenticated to critical systems. Review and minimize the privileges assigned to users interacting with the Float menu to limit potential damage. Conduct thorough security testing of the web application to identify and remediate other CSRF or related vulnerabilities. Finally, consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious content execution and cross-origin attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:21:38.618Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7332e6bfc5ba1def0c91

Added to database: 4/1/2026, 7:34:10 PM

Last enriched: 4/2/2026, 12:42:54 AM

Last updated: 4/4/2026, 8:25:29 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses