Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32621: Cross-Site Request Forgery (CSRF) in Vsourz Digital WP Map Route Planner

0
Unknown
VulnerabilityCVE-2025-32621cvecve-2025-32621
Published: Wed Apr 09 2025 (04/09/2025, 16:09:26 UTC)
Source: CVE Database V5
Vendor/Project: Vsourz Digital
Product: WP Map Route Planner

Description

Cross-Site Request Forgery (CSRF) vulnerability in Vsourz Digital WP Map Route Planner wp-map-route-planner allows Cross Site Request Forgery.This issue affects WP Map Route Planner: from n/a through <= 1.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:37:42 UTC

Technical Analysis

The vulnerability identified as CVE-2025-32621 is a Cross-Site Request Forgery (CSRF) flaw in the WP Map Route Planner plugin developed by Vsourz Digital for WordPress. This plugin, up to version 1.0.0, does not properly validate the origin of requests that perform sensitive actions, allowing attackers to craft malicious web pages that, when visited by authenticated users, cause unintended commands to be executed on the plugin. CSRF attacks exploit the trust a web application places in the user's browser, leveraging the victim's active session to perform actions such as modifying route data or plugin settings without explicit consent. Since the vulnerability affects versions up to 1.0.0 and no patch links are currently available, the plugin's users remain exposed. The attack requires the victim to be logged into the WordPress site with sufficient privileges, typically an administrator or editor role, but does not require additional authentication bypass or complex exploitation techniques. The vulnerability's impact is primarily on the integrity and availability of the route planning data managed by the plugin, potentially disrupting business operations dependent on accurate routing information. Although no exploits have been reported in the wild, the presence of this vulnerability in a widely used CMS plugin poses a tangible risk, especially given WordPress's large market share and the common use of plugins to extend functionality. The absence of a CVSS score means severity must be inferred from the nature of the vulnerability, the affected component, and the potential consequences of exploitation.

Potential Impact

The CSRF vulnerability in WP Map Route Planner can lead to unauthorized modification or deletion of route planning data, which may disrupt logistics, delivery services, or any business processes relying on accurate route information. For organizations, this could result in operational inefficiencies, financial losses, and reputational damage if customers experience service interruptions. Since the attack requires an authenticated user session, the impact is limited to sites where users with sufficient privileges are tricked into visiting malicious content. However, given the prevalence of WordPress and the plugin's role in route management, the scope of affected systems could be significant. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the compromised WordPress environment, potentially escalating privileges or deploying additional malicious payloads. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers often develop exploits after vulnerabilities are publicly disclosed. Overall, the impact is medium to high for organizations relying on this plugin for critical routing functions.

Mitigation Recommendations

To mitigate this CSRF vulnerability, organizations should first check for updates or patches from Vsourz Digital and apply them promptly once available. In the absence of an official patch, administrators can implement several practical measures: 1) Disable or deactivate the WP Map Route Planner plugin if it is not essential to reduce the attack surface. 2) Employ Web Application Firewalls (WAFs) with rules that detect and block CSRF attack patterns targeting the plugin's endpoints. 3) Enforce strict Content Security Policy (CSP) headers to limit the ability of attackers to inject malicious scripts or frames. 4) Educate privileged users about the risks of clicking unknown or suspicious links while logged into the WordPress admin panel. 5) Implement multi-factor authentication (MFA) to reduce the risk of session hijacking and unauthorized access. 6) Regularly audit user roles and permissions to ensure only necessary users have administrative access. 7) Monitor logs for unusual activity related to the plugin's functions that could indicate exploitation attempts. These steps, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:20:43.115Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73e4e6bfc5ba1def3faa

Added to database: 4/1/2026, 7:37:08 PM

Last enriched: 4/2/2026, 3:37:42 AM

Last updated: 4/3/2026, 8:27:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses