CVE-2025-49345: CWE-352 Cross-Site Request Forgery (CSRF) in mg12 WP-EasyArchives
CVE-2025-49345 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability in the mg12 WP-EasyArchives WordPress plugin, affecting versions up to 3. 1. 2. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user, potentially leading to stored Cross-Site Scripting (XSS). Exploitation requires user interaction but no prior authentication, and the vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 7. 1. Although no known exploits are currently in the wild, the vulnerability poses significant risks to websites using this plugin. European organizations using WP-EasyArchives should prioritize patching or mitigation to prevent exploitation. Countries with high WordPress usage and significant web presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation includes applying updates once available, implementing strict Content Security Policies (CSP), and employing anti-CSRF tokens and user interaction validation.
AI Analysis
Technical Summary
CVE-2025-49345 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the mg12 WP-EasyArchives WordPress plugin, affecting all versions up to 3.1.2. The vulnerability allows an attacker to trick authenticated users into executing unwanted actions without their consent by exploiting the lack of proper CSRF protections. This can lead to stored Cross-Site Scripting (XSS), where malicious scripts are permanently injected into the website's content, potentially compromising user sessions, stealing sensitive data, or defacing the site. The CVSS 3.1 base score of 7.1 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but collectively significant. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WordPress environments to manage archive displays, making it a valuable target for attackers aiming to compromise websites through CSRF and XSS chains.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized actions performed on their WordPress sites, including injection of malicious scripts that compromise user data, session tokens, or site integrity. This can result in data breaches, defacement, or service disruption, damaging reputation and causing regulatory compliance issues under GDPR. The vulnerability's ability to affect confidentiality, integrity, and availability means that sensitive customer or internal data could be exposed or altered. Since WordPress is widely used across Europe, especially in small to medium enterprises and public sector websites, the risk is significant. Attackers could leverage this vulnerability to pivot into more extensive network intrusions or conduct phishing campaigns using compromised sites. The lack of authentication requirements lowers the barrier for exploitation, increasing the threat level for organizations relying on this plugin.
Mitigation Recommendations
1. Monitor for official patches or updates from mg12 and apply them immediately once released. 2. In the absence of patches, implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting WP-EasyArchives. 3. Enforce strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and reduce the impact of stored XSS. 4. Employ anti-CSRF tokens in forms and verify their presence server-side to prevent unauthorized requests. 5. Limit user permissions to the minimum necessary, especially for roles that can modify plugin settings or content. 6. Regularly audit and monitor WordPress logs for suspicious activities indicative of CSRF or XSS exploitation attempts. 7. Educate users about phishing and social engineering risks that could facilitate CSRF attacks. 8. Consider temporarily disabling or replacing WP-EasyArchives if immediate patching is not possible and the risk is unacceptable.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-49345: CWE-352 Cross-Site Request Forgery (CSRF) in mg12 WP-EasyArchives
Description
CVE-2025-49345 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability in the mg12 WP-EasyArchives WordPress plugin, affecting versions up to 3. 1. 2. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user, potentially leading to stored Cross-Site Scripting (XSS). Exploitation requires user interaction but no prior authentication, and the vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 7. 1. Although no known exploits are currently in the wild, the vulnerability poses significant risks to websites using this plugin. European organizations using WP-EasyArchives should prioritize patching or mitigation to prevent exploitation. Countries with high WordPress usage and significant web presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation includes applying updates once available, implementing strict Content Security Policies (CSP), and employing anti-CSRF tokens and user interaction validation.
AI-Powered Analysis
Technical Analysis
CVE-2025-49345 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the mg12 WP-EasyArchives WordPress plugin, affecting all versions up to 3.1.2. The vulnerability allows an attacker to trick authenticated users into executing unwanted actions without their consent by exploiting the lack of proper CSRF protections. This can lead to stored Cross-Site Scripting (XSS), where malicious scripts are permanently injected into the website's content, potentially compromising user sessions, stealing sensitive data, or defacing the site. The CVSS 3.1 base score of 7.1 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but collectively significant. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WordPress environments to manage archive displays, making it a valuable target for attackers aiming to compromise websites through CSRF and XSS chains.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized actions performed on their WordPress sites, including injection of malicious scripts that compromise user data, session tokens, or site integrity. This can result in data breaches, defacement, or service disruption, damaging reputation and causing regulatory compliance issues under GDPR. The vulnerability's ability to affect confidentiality, integrity, and availability means that sensitive customer or internal data could be exposed or altered. Since WordPress is widely used across Europe, especially in small to medium enterprises and public sector websites, the risk is significant. Attackers could leverage this vulnerability to pivot into more extensive network intrusions or conduct phishing campaigns using compromised sites. The lack of authentication requirements lowers the barrier for exploitation, increasing the threat level for organizations relying on this plugin.
Mitigation Recommendations
1. Monitor for official patches or updates from mg12 and apply them immediately once released. 2. In the absence of patches, implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting WP-EasyArchives. 3. Enforce strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and reduce the impact of stored XSS. 4. Employ anti-CSRF tokens in forms and verify their presence server-side to prevent unauthorized requests. 5. Limit user permissions to the minimum necessary, especially for roles that can modify plugin settings or content. 6. Regularly audit and monitor WordPress logs for suspicious activities indicative of CSRF or XSS exploitation attempts. 7. Educate users about phishing and social engineering risks that could facilitate CSRF attacks. 8. Consider temporarily disabling or replacing WP-EasyArchives if immediate patching is not possible and the risk is unacceptable.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:34.939Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6954b496db813ff03ec88a7f
Added to database: 12/31/2025, 5:28:54 AM
Last enriched: 1/7/2026, 1:01:25 PM
Last updated: 1/8/2026, 7:21:32 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.