Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49351: Cross-Site Request Forgery (CSRF) in Valentin Agachi Create Posts & Terms

0
Unknown
VulnerabilityCVE-2025-49351cvecve-2025-49351
Published: Tue Dec 09 2025 (12/09/2025, 14:52:18 UTC)
Source: CVE Database V5
Vendor/Project: Valentin Agachi
Product: Create Posts & Terms

Description

Cross-Site Request Forgery (CSRF) vulnerability in Valentin Agachi Create Posts &amp; Terms create-posts-terms allows Stored XSS.This issue affects Create Posts &amp; Terms: from n/a through <= 1.3.1.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:20:42 UTC

Technical Analysis

CVE-2025-49351 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Create Posts & Terms plugin developed by Valentin Agachi, affecting versions up to and including 1.3.1. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application, leveraging the victim's credentials and session. In this case, the CSRF flaw enables an attacker to inject stored Cross-Site Scripting (XSS) payloads into the application. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in posts or terms, and executed in the context of other users' browsers. This combination is particularly dangerous because it allows persistent exploitation, potentially compromising user accounts, stealing cookies, or performing unauthorized actions. Exploitation requires the victim to be logged into a site using the vulnerable plugin and to visit a malicious webpage crafted by the attacker. Although no exploits are currently known in the wild and no patches have been officially released, the vulnerability is publicly disclosed and should be treated as a significant risk. The absence of a CVSS score necessitates a severity assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope of affected systems. The plugin is commonly used in WordPress environments, which are widespread globally, including Europe. The vulnerability impacts the integrity and confidentiality of affected systems by enabling unauthorized content injection and potential session hijacking.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites using the Create Posts & Terms plugin, particularly those running WordPress content management systems. Successful exploitation can lead to persistent XSS attacks, which may compromise user credentials, enable privilege escalation, and facilitate further attacks such as phishing or malware distribution. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR due to unauthorized access or data leakage. The impact is amplified for organizations relying heavily on web presence for business operations, including e-commerce, government portals, and media outlets. Additionally, the vulnerability could be leveraged to target administrators or privileged users, increasing the potential damage. The lack of an available patch increases the window of exposure, making timely mitigation critical. Given the widespread use of WordPress in Europe, the threat surface is considerable, especially for small to medium enterprises that may lack robust security controls.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Create Posts & Terms plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate the attack vector. Implementing Web Application Firewalls (WAFs) with rules to detect and block CSRF attempts and suspicious POST requests can provide interim protection. Enforcing strict Content Security Policies (CSP) can help mitigate the impact of stored XSS by restricting script execution. Additionally, administrators should ensure that all users follow best practices such as logging out of administrative sessions when not in use and avoiding visiting untrusted websites while authenticated. Monitoring web server logs and user activity for unusual behavior indicative of exploitation attempts is recommended. Once a patch is available, prompt application is essential. Educating users about the risks of CSRF and XSS and encouraging the use of multi-factor authentication can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:34.940Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383abe29cea75c35b76e73

Added to database: 12/9/2025, 3:05:34 PM

Last enriched: 12/9/2025, 3:20:42 PM

Last updated: 12/10/2025, 4:14:50 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats