Skip to main content

CVE-2025-49896: CWE-352 Cross-Site Request Forgery (CSRF) in wptasker WP Discord Post Plus – Supports Unlimited Channels

Medium
VulnerabilityCVE-2025-49896cvecve-2025-49896cwe-352
Published: Wed Aug 20 2025 (08/20/2025, 08:03:35 UTC)
Source: CVE Database V5
Vendor/Project: wptasker
Product: WP Discord Post Plus – Supports Unlimited Channels

Description

Cross-Site Request Forgery (CSRF) vulnerability in wptasker WP Discord Post Plus – Supports Unlimited Channels allows Cross Site Request Forgery. This issue affects WP Discord Post Plus – Supports Unlimited Channels: from n/a through 1.0.2.

AI-Powered Analysis

AILast updated: 08/20/2025, 09:20:46 UTC

Technical Analysis

The security threat identified as CVE-2025-49896 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'WP Discord Post Plus – Supports Unlimited Channels' developed by wptasker. This vulnerability exists in versions up to 1.0.2 of the plugin. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application where the user is currently authenticated, thereby performing unwanted actions on behalf of the user without their consent. In this case, the vulnerability could allow an attacker to manipulate the plugin's functionality, potentially causing unauthorized changes or actions related to posting messages to Discord channels via the plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (such as clicking a malicious link). The impact is limited to integrity (I:L) with no confidentiality or availability impact. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which specifically relates to CSRF attacks. This type of vulnerability is common in web applications and plugins that do not implement proper anti-CSRF tokens or other protective mechanisms to validate the authenticity of requests. Given that the plugin integrates WordPress with Discord channels, exploitation could lead to unauthorized posting or manipulation of messages, which could be leveraged for misinformation, spam, or social engineering attacks within organizations using this plugin.

Potential Impact

For European organizations using WordPress sites integrated with Discord via the WP Discord Post Plus plugin, this vulnerability could lead to unauthorized manipulation of Discord posts. While the direct confidentiality and availability impacts are minimal, the integrity impact could be significant in contexts where Discord channels are used for official communications, alerts, or coordination. Attackers could inject misleading or malicious messages, potentially causing reputational damage, misinformation spread, or disruption of communication workflows. Organizations relying on Discord for internal or external communications, especially in sectors like finance, government, or critical infrastructure, could face operational risks. Additionally, if attackers use this vector as part of a broader social engineering campaign, it could facilitate phishing or credential theft. The medium severity rating suggests that while the risk is not critical, it should not be ignored, especially in environments where the plugin is actively used and Discord communications are sensitive or mission-critical.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the WP Discord Post Plus plugin until a security patch is released. 2. If the plugin is essential, restrict administrative access to trusted users only and implement strict user role management to minimize the risk of CSRF exploitation. 3. Monitor Discord channels for unusual or unauthorized posts that could indicate exploitation attempts. 4. Implement web application firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting the plugin endpoints. 5. Encourage users to avoid clicking on suspicious links or performing actions on untrusted websites while authenticated to WordPress sites using this plugin. 6. Once a patch is available, apply it promptly and verify that anti-CSRF tokens or other protections have been implemented. 7. Conduct security awareness training focused on recognizing social engineering attempts that could leverage this vulnerability. 8. Review and harden WordPress security configurations, including enabling security plugins that provide CSRF protection and logging capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:34.446Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b6ad5a09ad0002e35f

Added to database: 8/20/2025, 8:17:58 AM

Last enriched: 8/20/2025, 9:20:46 AM

Last updated: 8/27/2025, 12:34:26 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats