Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3870: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in olarmarius 1 Decembrie 1918

0
Medium
VulnerabilityCVE-2025-3870cvecve-2025-3870cwe-79
Published: Fri Apr 25 2025 (04/25/2025, 08:22:13 UTC)
Source: CVE
Vendor/Project: olarmarius
Product: 1 Decembrie 1918

Description

The 1 Decembrie 1918 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.dec.2012. This is due to missing or incorrect nonce validation on the 1-decembrie-1918/1-decembrie-1918.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:58:51 UTC

Technical Analysis

CVE-2025-3870 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation, i.e., Cross-site Scripting) affecting the '1 Decembrie 1918' WordPress plugin developed by olarmarius. The vulnerability exists in all versions up to and including 1.dec.2012 due to missing or incorrect nonce validation on the '1-decembrie-1918/1-decembrie-1918.php' page. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. The absence or improper implementation of nonce validation allows unauthenticated attackers to craft malicious requests that can be executed if an administrator is tricked into clicking a specially crafted link or visiting a malicious page. This can lead to unauthorized updates of plugin settings and injection of malicious web scripts, potentially enabling further attacks such as session hijacking or defacement. The CVSS v3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction, and impacting confidentiality and integrity with a scope change. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is particularly critical for sites where the plugin is active and administrators have elevated privileges, as exploitation could compromise site integrity and user trust.

Potential Impact

The primary impact of CVE-2025-3870 is unauthorized modification of plugin settings and injection of malicious scripts, which can degrade the confidentiality and integrity of affected WordPress sites. Attackers can leverage this to execute further attacks such as stealing administrator session cookies, redirecting users to malicious sites, or defacing the website. While availability is not directly impacted, the trustworthiness and security posture of the site can be severely undermined. Organizations relying on this plugin risk reputational damage, potential data leakage, and increased exposure to follow-on attacks. Since exploitation requires tricking an administrator, social engineering is a key factor, increasing the risk in environments with less security awareness. The scope change in the CVSS vector indicates that the vulnerability can affect components beyond the initially targeted plugin page, potentially impacting the entire WordPress installation. This threat is relevant for any organization using the vulnerable plugin, especially those with public-facing websites and high administrative activity.

Mitigation Recommendations

Immediate mitigation should focus on restricting administrative access to trusted personnel and enforcing strong user awareness training to prevent social engineering attacks that could trick administrators into clicking malicious links. Since no official patches are currently available, organizations should consider disabling or removing the '1 Decembrie 1918' plugin until a fix is released. Implementing Web Application Firewalls (WAFs) with rules to detect and block CSRF attempts targeting the vulnerable plugin page can reduce risk. Administrators should monitor logs for unusual requests or changes to plugin settings. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Additionally, site owners should ensure WordPress core and all plugins are kept up to date and subscribe to vulnerability advisories for timely patching once available. Finally, isolating administrative interfaces behind VPNs or IP whitelisting can further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-22T14:54:45.797Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf051c

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 2/27/2026, 1:58:51 PM

Last updated: 3/25/2026, 1:41:58 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses