Skip to main content

CVE-2025-47661: CWE-352 Cross-Site Request Forgery (CSRF) in codemstory 워드프레스 결제 심플페이

Medium
VulnerabilityCVE-2025-47661cvecve-2025-47661cwe-352
Published: Wed May 07 2025 (05/07/2025, 14:20:47 UTC)
Source: CVE
Vendor/Project: codemstory
Product: 워드프레스 결제 심플페이

Description

Cross-Site Request Forgery (CSRF) vulnerability in codemstory 워드프레스 결제 심플페이 allows Cross Site Request Forgery. This issue affects 워드프레스 결제 심플페이: from n/a through 5.2.11.

AI-Powered Analysis

AILast updated: 07/05/2025, 11:55:09 UTC

Technical Analysis

CVE-2025-47661 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress payment plugin '워드프레스 결제 심플페이' developed by codemstory. This vulnerability affects versions up to 5.2.11 of the plugin. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the vulnerability could enable an attacker to perform unauthorized actions related to payment processing or configuration changes within the plugin without the user's consent. The CVSS 3.1 base score is 5.4 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact affects integrity and availability but not confidentiality, meaning that unauthorized changes or disruptions to payment processing could occur, but sensitive data leakage is not directly implicated. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. Since the plugin is used in WordPress environments, the attack surface includes websites using this plugin for payment processing, potentially exposing e-commerce and transactional websites to risk.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to e-commerce platforms and any websites using the affected WordPress payment plugin. Successful exploitation could lead to unauthorized payment transactions or manipulation of payment settings, potentially causing financial losses, disruption of services, and damage to customer trust. Given the nature of CSRF, attackers could leverage social engineering or phishing to induce users to perform unintended actions. The integrity and availability of payment processing could be compromised, affecting business operations and compliance with European regulations such as GDPR and PSD2, which mandate secure handling of payment data and transactions. Organizations relying on this plugin without mitigation may face operational disruptions and reputational damage, especially those with high transaction volumes or critical online services.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting the use of the affected plugin until a patch is available. 2. Implement anti-CSRF tokens in all state-changing requests within the plugin to ensure that requests are legitimate and originate from authenticated users. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attack patterns targeting the plugin endpoints. 4. Educate users and administrators about phishing and social engineering tactics that could be used to exploit this vulnerability. 5. Monitor logs for unusual or unauthorized payment-related activities. 6. Regularly update WordPress and all plugins to the latest versions once patches are released. 7. Consider additional multi-factor authentication (MFA) for administrative actions related to payment processing to reduce risk from CSRF attacks. 8. Conduct security audits and penetration testing focusing on payment workflows to identify and remediate similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:45:20.229Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd932b

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 11:55:09 AM

Last updated: 7/26/2025, 5:40:45 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats