Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rafe007 Ajax Comment Form CST

0
Medium
VulnerabilityCVE-2025-3867cvecve-2025-3867cwe-79
Published: Fri Apr 25 2025 (04/25/2025, 06:45:27 UTC)
Source: CVE
Vendor/Project: rafe007
Product: Ajax Comment Form CST

Description

The Ajax Comment Form CST plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation via the 'acform_cst_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:58:18 UTC

Technical Analysis

CVE-2025-3867 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Ajax Comment Form CST plugin for WordPress, specifically affecting all versions up to 1.2. The root cause is the absence or incorrect implementation of nonce validation on the 'acform_cst_settings' administrative page. Nonces are security tokens used to verify the legitimacy of requests to prevent CSRF attacks. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), allows unauthorized modification of plugin settings. This modification can include injecting malicious JavaScript code, leading to Cross-Site Scripting (CWE-79). The vulnerability requires no privileges for the attacker but does require user interaction, specifically that an administrator is tricked into performing the action. The CVSS v3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes potential confidentiality and integrity breaches through script injection, which could be used for session hijacking, defacement, or further exploitation. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is relevant to all WordPress sites using the Ajax Comment Form CST plugin, which is a niche but potentially widely deployed plugin for comment management.

Potential Impact

The primary impact of CVE-2025-3867 is unauthorized modification of plugin settings and injection of malicious scripts via CSRF, which can lead to Cross-Site Scripting attacks. This compromises the confidentiality and integrity of affected WordPress sites by allowing attackers to execute arbitrary JavaScript in the context of the administrator's browser. Potential consequences include session hijacking, credential theft, defacement, and pivoting to further attacks within the site or network. Since the vulnerability requires an administrator to be tricked into clicking a malicious link, social engineering is a key factor, increasing the risk in environments with less security awareness. The scope change in the CVSS vector indicates that the vulnerability affects components beyond the plugin itself, potentially impacting the entire WordPress site. Organizations running websites with this plugin are at risk of reputational damage, data breaches, and loss of user trust. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed and shared. The vulnerability is particularly impactful for organizations relying on WordPress for customer engagement, content management, or e-commerce, where trust and data integrity are critical.

Mitigation Recommendations

To mitigate CVE-2025-3867, organizations should first verify if they use the Ajax Comment Form CST plugin and identify the version in use. Immediate mitigation includes restricting administrative access to trusted personnel only and enforcing multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Administrators should be trained to recognize phishing attempts and avoid clicking suspicious links, especially those that could trigger administrative actions. Since no official patch is currently available, consider temporarily disabling or removing the plugin until a fix is released. Implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting the 'acform_cst_settings' endpoint. Monitor logs for unusual POST requests or changes to plugin settings. Additionally, site owners can implement Content Security Policy (CSP) headers to limit the impact of injected scripts. Regular backups and incident response plans should be updated to quickly recover from potential exploitation. Finally, stay informed about updates from the plugin vendor or WordPress security advisories to apply patches promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-22T14:47:52.051Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf01e3

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 2/27/2026, 1:58:18 PM

Last updated: 3/23/2026, 9:53:51 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses