Skip to main content

CVE-2025-47491: CWE-352 Cross-Site Request Forgery (CSRF) in A WP Life Contact Form Widget

High
VulnerabilityCVE-2025-47491cvecve-2025-47491cwe-352
Published: Wed May 07 2025 (05/07/2025, 14:19:52 UTC)
Source: CVE
Vendor/Project: A WP Life
Product: Contact Form Widget

Description

Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Contact Form Widget allows Cross Site Request Forgery. This issue affects Contact Form Widget: from n/a through 1.4.6.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:54:32 UTC

Technical Analysis

CVE-2025-47491 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the A WP Life Contact Form Widget, a WordPress plugin used to embed contact forms on websites. The vulnerability affects versions up to 1.4.6. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the Contact Form Widget does not properly validate the origin of requests, enabling attackers to craft malicious web pages or links that, when visited by an authenticated administrator or user with sufficient privileges, can cause unauthorized actions to be performed on the vulnerable WordPress site. The CVSS v3.1 base score of 7.4 (high severity) reflects that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact is high on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). This suggests that sensitive information accessible to the plugin or site may be exposed or leaked due to the CSRF attack, but the attacker cannot modify data or disrupt service directly. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or updates from the vendor in the near future. The vulnerability is classified under CWE-352, which is a common web security weakness related to insufficient request validation against CSRF attacks.

Potential Impact

For European organizations using WordPress sites with the A WP Life Contact Form Widget, this vulnerability poses a significant risk to the confidentiality of sensitive data collected via contact forms or stored within the plugin's scope. Attackers could exploit this flaw to exfiltrate private user information or internal data without authorization. Since the vulnerability requires user interaction but no authentication, phishing campaigns targeting site administrators or privileged users could be effective. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. The inability to modify or disrupt data integrity or availability limits the threat to data exposure rather than service disruption or data tampering. However, the changed scope means that the impact could extend beyond the plugin itself, potentially affecting other components or data accessible through the compromised session. Organizations relying on this plugin for customer interactions or lead generation may face operational risks if confidential communications are intercepted or leaked.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the A WP Life Contact Form Widget. Until an official patch is released, administrators should consider disabling or removing the vulnerable plugin to eliminate exposure. If removal is not feasible, implementing Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting the plugin's endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers and SameSite cookie attributes can help mitigate CSRF by restricting cross-origin requests. Additionally, educating administrators and privileged users about the risks of clicking untrusted links and implementing multi-factor authentication (MFA) can reduce the likelihood of successful exploitation. Monitoring web server logs for unusual POST requests or suspicious referrers related to the contact form endpoints can aid in early detection. Organizations should also subscribe to vendor advisories and Patchstack updates to apply official fixes promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:39:15.825Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8396

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:54:32 AM

Last updated: 8/8/2025, 3:33:57 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats