Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49345: CWE-352 Cross-Site Request Forgery (CSRF) in mg12 WP-EasyArchives

0
High
VulnerabilityCVE-2025-49345cvecve-2025-49345cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 05:23:28 UTC)
Source: CVE Database V5
Vendor/Project: mg12
Product: WP-EasyArchives

Description

Cross-Site Request Forgery (CSRF) vulnerability in mg12 WP-EasyArchives allows Stored XSS.This issue affects WP-EasyArchives: from n/a through 3.1.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:58:47 UTC

Technical Analysis

CVE-2025-49345 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the mg12 WP-EasyArchives WordPress plugin, affecting all versions up to 3.1.2. The vulnerability allows an attacker to trick authenticated users into executing unwanted actions on their behalf without their consent. This CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist on the affected site and execute in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability at a low to moderate level. No patches or exploit code are currently available, but the vulnerability is publicly disclosed and assigned a CVE. The plugin is widely used in WordPress environments to manage archive displays, making it a valuable target for attackers aiming to compromise websites through persistent XSS or unauthorized actions. The lack of authentication requirement and low complexity make this vulnerability attractive for exploitation once weaponized.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized changes to website content, defacement, data leakage through stored XSS, and potential compromise of user sessions. Attackers could exploit the CSRF to inject malicious scripts that steal cookies, credentials, or perform actions on behalf of users, leading to reputational damage and regulatory compliance issues under GDPR. Organizations relying on WP-EasyArchives for content management may face service disruptions or data integrity issues. The broad impact on confidentiality, integrity, and availability can affect customer trust and operational continuity. Since WordPress powers a large portion of European websites, especially small to medium enterprises and public sector sites, the threat surface is considerable. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid exploitation once exploit code is developed is high.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the WP-EasyArchives plugin until a security patch is released by the vendor. Organizations should audit their WordPress installations to identify the presence of this plugin and remove or replace it with a secure alternative. Implementing strict Content Security Policies (CSP) can help mitigate the impact of stored XSS by restricting script execution sources. Web Application Firewalls (WAFs) should be configured to detect and block CSRF attack patterns and suspicious POST requests targeting the plugin's endpoints. Enforcing multi-factor authentication (MFA) for administrative accounts reduces the risk of session hijacking. Regular security scanning and monitoring for unusual activity on WordPress sites are recommended. Finally, organizations should subscribe to vendor and security mailing lists to receive timely updates and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:34.939Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6954b496db813ff03ec88a7f

Added to database: 12/31/2025, 5:28:54 AM

Last enriched: 1/20/2026, 7:58:47 PM

Last updated: 2/6/2026, 5:14:44 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats