CVE-2025-49284: CWE-352 Cross-Site Request Forgery (CSRF) in wp-buy WP Maintenance Mode & Site Under Construction
Cross-Site Request Forgery (CSRF) vulnerability in wp-buy WP Maintenance Mode & Site Under Construction allows Cross Site Request Forgery. This issue affects WP Maintenance Mode & Site Under Construction: from n/a through 4.3.
AI Analysis
Technical Summary
CVE-2025-49284 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin "WP Maintenance Mode & Site Under Construction" developed by wp-buy. This vulnerability affects all versions up to 4.3. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to a web application in which they are currently authenticated, potentially causing unintended actions without the user's consent. In this case, the vulnerability could allow an attacker to perform unauthorized state-changing operations on the affected WordPress site by exploiting the lack of proper anti-CSRF tokens or validation mechanisms in the plugin's request handling. The CVSS 3.1 base score is 4.3 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. No known exploits are currently in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-352, which is the standard classification for CSRF issues. This plugin is commonly used to put WordPress sites into maintenance or construction mode, often temporarily restricting access or displaying custom messages during site updates or development.
Potential Impact
For European organizations using WordPress sites with the WP Maintenance Mode & Site Under Construction plugin, this vulnerability could allow attackers to perform unauthorized changes to site settings or maintenance mode configurations by tricking authenticated administrators or users with sufficient privileges into executing malicious requests. While the confidentiality and availability of the site are not directly impacted, the integrity of site configurations can be compromised, potentially leading to unauthorized site behavior or exposure of the site during maintenance windows. This could result in reputational damage, disruption of planned maintenance activities, or unauthorized exposure of the site to visitors. Organizations relying on this plugin for critical maintenance workflows may experience operational disruptions. Given the medium severity and the requirement for user interaction, the risk is moderate but should not be ignored, especially in environments where multiple administrators or privileged users access the WordPress backend.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the WP Maintenance Mode & Site Under Construction plugin, particularly versions up to 4.3. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 2) Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts that could trigger CSRF requests. 3) Educate administrators and privileged users to avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin panels. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests that could exploit CSRF. 5) Monitor logs for unusual administrative actions or changes to maintenance mode settings. 6) Consider temporarily disabling the plugin during critical periods or until a patch is available. 7) Follow vendor communications closely for patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49284: CWE-352 Cross-Site Request Forgery (CSRF) in wp-buy WP Maintenance Mode & Site Under Construction
Description
Cross-Site Request Forgery (CSRF) vulnerability in wp-buy WP Maintenance Mode & Site Under Construction allows Cross Site Request Forgery. This issue affects WP Maintenance Mode & Site Under Construction: from n/a through 4.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-49284 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin "WP Maintenance Mode & Site Under Construction" developed by wp-buy. This vulnerability affects all versions up to 4.3. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to a web application in which they are currently authenticated, potentially causing unintended actions without the user's consent. In this case, the vulnerability could allow an attacker to perform unauthorized state-changing operations on the affected WordPress site by exploiting the lack of proper anti-CSRF tokens or validation mechanisms in the plugin's request handling. The CVSS 3.1 base score is 4.3 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. No known exploits are currently in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-352, which is the standard classification for CSRF issues. This plugin is commonly used to put WordPress sites into maintenance or construction mode, often temporarily restricting access or displaying custom messages during site updates or development.
Potential Impact
For European organizations using WordPress sites with the WP Maintenance Mode & Site Under Construction plugin, this vulnerability could allow attackers to perform unauthorized changes to site settings or maintenance mode configurations by tricking authenticated administrators or users with sufficient privileges into executing malicious requests. While the confidentiality and availability of the site are not directly impacted, the integrity of site configurations can be compromised, potentially leading to unauthorized site behavior or exposure of the site during maintenance windows. This could result in reputational damage, disruption of planned maintenance activities, or unauthorized exposure of the site to visitors. Organizations relying on this plugin for critical maintenance workflows may experience operational disruptions. Given the medium severity and the requirement for user interaction, the risk is moderate but should not be ignored, especially in environments where multiple administrators or privileged users access the WordPress backend.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the WP Maintenance Mode & Site Under Construction plugin, particularly versions up to 4.3. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 2) Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts that could trigger CSRF requests. 3) Educate administrators and privileged users to avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin panels. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests that could exploit CSRF. 5) Monitor logs for unusual administrative actions or changes to maintenance mode settings. 6) Consider temporarily disabling the plugin during critical periods or until a patch is available. 7) Follow vendor communications closely for patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:41:43.867Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842ede071f4d251b5c880fc
Added to database: 6/6/2025, 1:32:16 PM
Last enriched: 7/7/2025, 10:39:57 PM
Last updated: 8/5/2025, 10:30:39 AM
Views: 10
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.