Skip to main content

CVE-2025-30995: CWE-352 Cross-Site Request Forgery (CSRF) in OTWthemes Widgetize Pages Light

High
VulnerabilityCVE-2025-30995cvecve-2025-30995cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:54:01 UTC)
Source: CVE Database V5
Vendor/Project: OTWthemes
Product: Widgetize Pages Light

Description

Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Widgetize Pages Light allows Stored XSS. This issue affects Widgetize Pages Light: from n/a through 3.0.

AI-Powered Analysis

AILast updated: 07/07/2025, 21:10:13 UTC

Technical Analysis

CVE-2025-30995 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the OTWthemes Widgetize Pages Light plugin, affecting versions up to 3.0. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. Specifically, this CSRF flaw enables Stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently stored on the target system and executed when other users access the compromised content. The vulnerability arises because the plugin does not adequately verify the origin of requests, allowing attackers to craft malicious web requests that, when executed by a logged-in user, can inject persistent malicious scripts. These scripts can then be used to steal sensitive information, manipulate user sessions, or perform further attacks within the context of the affected website. The CVSS 3.1 base score of 7.1 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is rated as low to moderate (C:L/I:L/A:L), but the combination of CSRF and stored XSS significantly elevates the risk, as it can lead to persistent compromise of user data and site integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet, suggesting that mitigation efforts should be proactive. This vulnerability is particularly relevant for websites using the Widgetize Pages Light plugin, commonly deployed in content management systems to enhance page widgetization and customization.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress or similar CMS platforms with the Widgetize Pages Light plugin installed. The stored XSS enabled by CSRF can lead to data theft, session hijacking, defacement, or distribution of malware through trusted websites. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause operational disruptions. Since the attack requires user interaction but no authentication privileges, it can target a broad user base, including employees and customers. The persistent nature of stored XSS means that once exploited, the malicious payload can affect multiple users over time, increasing the potential impact. European organizations in sectors such as finance, healthcare, e-commerce, and government, which often have strict data protection requirements and high-value targets, are particularly vulnerable to exploitation. Additionally, the cross-site nature of the attack could facilitate lateral movement within networks or compromise trusted third-party integrations, amplifying the threat landscape.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the Widgetize Pages Light plugin until an official patch is released. 2. Implement strict CSRF protections by enforcing anti-CSRF tokens in all state-changing requests within the plugin. 3. Conduct a thorough audit of all user input handling and output encoding to prevent stored XSS, ensuring that any data stored and rendered is properly sanitized. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. 5. Educate users and administrators about the risks of interacting with suspicious links or websites to reduce the likelihood of successful user interaction exploitation. 6. Monitor web server logs and application behavior for unusual requests or signs of exploitation attempts. 7. Keep all CMS platforms, plugins, and dependencies up to date with the latest security patches. 8. Consider implementing Web Application Firewalls (WAF) with rules targeting CSRF and XSS attack patterns to provide an additional layer of defense. 9. Prepare incident response plans specifically addressing web application compromises involving CSRF and XSS vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:22:48.161Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842edde71f4d251b5c8804c

Added to database: 6/6/2025, 1:32:14 PM

Last enriched: 7/7/2025, 9:10:13 PM

Last updated: 8/11/2025, 2:27:44 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats