Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32644: Cross-Site Request Forgery (CSRF) in IP2Location IP2Location World Clock

0
Unknown
VulnerabilityCVE-2025-32644cvecve-2025-32644
Published: Wed Apr 09 2025 (04/09/2025, 16:09:21 UTC)
Source: CVE Database V5
Vendor/Project: IP2Location
Product: IP2Location World Clock

Description

Cross-Site Request Forgery (CSRF) vulnerability in IP2Location IP2Location World Clock ip2location-world-clock allows Stored XSS.This issue affects IP2Location World Clock: from n/a through <= 1.1.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:42:38 UTC

Technical Analysis

CVE-2025-32644 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the IP2Location World Clock plugin, specifically affecting versions up to and including 1.1.9. The vulnerability allows attackers to trick authenticated users into submitting unauthorized requests to the application, which can result in stored Cross-Site Scripting (XSS) attacks. Stored XSS occurs when malicious scripts injected by an attacker are permanently stored on the target server and executed in the context of other users' browsers, leading to session hijacking, data theft, or further exploitation. The CSRF aspect means that attackers can craft malicious web pages or links that cause users to unknowingly perform actions with their privileges, such as injecting malicious content. The plugin is commonly used to display world clocks based on IP geolocation data, and the vulnerability arises from insufficient validation of requests and inadequate input sanitization. No CVSS score has been assigned yet, and no patches or official fixes are currently available. Exploitation does not require user interaction beyond visiting a malicious page, and authentication is required, as the attack leverages the victim's authenticated session. The combination of CSRF and stored XSS significantly increases the risk profile, as it can lead to persistent compromise of user data and application integrity.

Potential Impact

The impact of CVE-2025-32644 is significant for organizations using the IP2Location World Clock plugin. Successful exploitation can lead to unauthorized actions performed in the context of authenticated users, potentially allowing attackers to inject persistent malicious scripts. This can compromise user confidentiality by stealing session cookies or sensitive data, impact integrity by modifying displayed content or stored data, and affect availability if malicious scripts disrupt normal operations. The stored XSS component can facilitate further attacks such as phishing, malware distribution, or privilege escalation within the affected environment. Organizations relying on this plugin for geolocation services or time display may face reputational damage, data breaches, and regulatory consequences if exploited. The lack of an official patch increases the window of exposure, making proactive mitigation essential. The threat is amplified in environments with multiple users and high privilege levels, such as enterprise portals or public-facing websites.

Mitigation Recommendations

To mitigate CVE-2025-32644, organizations should immediately assess the use of the IP2Location World Clock plugin and consider disabling or removing it if not essential. Implementing robust CSRF protections is critical; this includes enforcing anti-CSRF tokens on all state-changing requests and validating the origin and referer headers. Input validation and output encoding should be enhanced to prevent stored XSS, ensuring that all user-supplied data is properly sanitized before storage and rendering. Monitoring web server and application logs for unusual or unauthorized requests can help detect exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) can be configured to block suspicious CSRF and XSS payloads. Organizations should stay alert for official patches or updates from IP2Location and apply them promptly once released. Additionally, educating users about the risks of clicking unknown links and maintaining up-to-date browser security settings can reduce the risk of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:20:57.810Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73e8e6bfc5ba1def4042

Added to database: 4/1/2026, 7:37:12 PM

Last enriched: 4/2/2026, 3:42:38 AM

Last updated: 4/6/2026, 9:30:22 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses