Skip to main content

CVE-2025-48353: CWE-352 Cross-Site Request Forgery (CSRF) in dactum Clickbank WordPress Plugin (Niche Storefront)

High
VulnerabilityCVE-2025-48353cvecve-2025-48353cwe-352
Published: Thu Aug 28 2025 (08/28/2025, 12:37:05 UTC)
Source: CVE Database V5
Vendor/Project: dactum
Product: Clickbank WordPress Plugin (Niche Storefront)

Description

Cross-Site Request Forgery (CSRF) vulnerability in dactum Clickbank WordPress Plugin (Niche Storefront) allows Stored XSS. This issue affects Clickbank WordPress Plugin (Niche Storefront): from n/a through 1.3.5.

AI-Powered Analysis

AILast updated: 08/28/2025, 13:48:08 UTC

Technical Analysis

CVE-2025-48353 is a high-severity vulnerability affecting the dactum Clickbank WordPress Plugin (Niche Storefront) up to version 1.3.5. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Specifically, this CSRF flaw allows an attacker to inject stored Cross-Site Scripting (XSS) payloads into the plugin, which can then be executed when other users access the affected pages. The vulnerability arises because the plugin does not properly validate or verify the origin of requests, allowing malicious sites to trick authenticated users into submitting crafted requests without their consent. The stored XSS component means that malicious scripts can persist on the site, potentially impacting multiple users and enabling session hijacking, privilege escalation, or distribution of malware. The CVSS 3.1 score of 7.1 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, impacting confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require vendor updates or manual intervention. This vulnerability is particularly concerning for WordPress sites using the Clickbank plugin for e-commerce or affiliate marketing storefronts, as exploitation could lead to unauthorized transactions, data theft, or site defacement.

Potential Impact

For European organizations, this vulnerability poses significant risks especially for small to medium enterprises and online retailers using WordPress with the Clickbank plugin to manage niche storefronts. Exploitation could lead to unauthorized actions such as fraudulent purchases, manipulation of affiliate links, or injection of malicious scripts that compromise customer data and site integrity. The stored XSS aspect can facilitate broader attacks like session hijacking or malware distribution, undermining customer trust and potentially violating GDPR requirements regarding data protection and breach notification. The availability impact, while rated low, could still disrupt business operations if attackers deface or disable storefronts. Given the plugin’s role in e-commerce, financial losses and reputational damage are probable consequences. Additionally, the cross-site nature of the attack means that users visiting compromised sites could be affected, amplifying the threat. European organizations must consider the regulatory implications of such breaches, including fines and legal actions under GDPR.

Mitigation Recommendations

Immediate mitigation should focus on disabling or restricting the Clickbank WordPress plugin until a vendor patch is released. Administrators should implement strict Content Security Policies (CSP) to limit the execution of injected scripts and employ Web Application Firewalls (WAFs) with rules targeting CSRF and XSS attack patterns. Enabling anti-CSRF tokens in forms and verifying HTTP referer headers can help prevent unauthorized requests. Regularly updating WordPress core and plugins is essential once patches become available. Organizations should audit user permissions to minimize the number of users with administrative access, reducing the attack surface. Monitoring logs for unusual POST requests or unexpected changes in plugin-related data can provide early detection. Educating users about the risks of interacting with suspicious links and ensuring browsers are up to date can reduce successful exploitation. Finally, backing up site data frequently ensures recovery capability in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-19T14:41:42.787Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b0537ead5a09ad006cfcb8

Added to database: 8/28/2025, 1:02:54 PM

Last enriched: 8/28/2025, 1:48:08 PM

Last updated: 9/5/2025, 12:26:10 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats