CVE-2025-52794: CWE-352 Cross-Site Request Forgery (CSRF) in Creative-Solutions Creative Contact Form
Cross-Site Request Forgery (CSRF) vulnerability in Creative-Solutions Creative Contact Form allows Stored XSS. This issue affects Creative Contact Form: from n/a through 1.0.0.
AI Analysis
Technical Summary
CVE-2025-52794 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery, CSRF) affecting the Creative-Solutions Creative Contact Form plugin, specifically versions up to 1.0.0. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the lack of proper CSRF protections. This CSRF flaw enables the injection of stored Cross-Site Scripting (XSS) payloads into the contact form, which can then be executed in the context of users viewing the affected form or its submissions. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as tricking a user into visiting a malicious webpage. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the web application or user sessions. The impact includes low confidentiality, integrity, and availability losses (C:L/I:L/A:L), meaning an attacker can steal limited data, modify some content, or cause minor service disruptions. However, the stored XSS combined with CSRF can lead to persistent attacks, session hijacking, or further exploitation chains. No official patches or fixes have been published yet, and no known exploits are currently active in the wild. The vulnerability affects installations of the Creative Contact Form plugin, which is typically used on websites to manage user inquiries and contact submissions. The attack vector is network-based and does not require authentication, increasing the risk of exploitation if the plugin is widely deployed without mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for entities relying on the Creative Contact Form plugin for customer interaction, such as SMEs, e-commerce sites, and service providers. Exploitation could lead to unauthorized actions performed on behalf of users, including injection of malicious scripts that compromise user data confidentiality and integrity. Stored XSS could facilitate session hijacking, credential theft, or distribution of malware to site visitors, damaging brand reputation and potentially violating GDPR requirements concerning personal data protection. The availability impact is low but could still disrupt customer communication channels. Organizations with high web traffic or sensitive customer data are at greater risk. The lack of authentication requirement and remote exploitability means attackers can target these organizations without prior access, increasing the threat surface. Additionally, the persistent nature of stored XSS can lead to prolonged exposure and exploitation if not promptly addressed.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the Creative Contact Form plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF attempts and suspicious POST requests targeting the contact form endpoints. 3. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 4. Conduct thorough input validation and output encoding on all user-submitted data fields to prevent script injection. 5. Educate users and administrators about phishing and social engineering risks related to CSRF attacks. 6. Monitor web server logs for unusual POST requests or repeated access patterns indicative of exploitation attempts. 7. Once available, promptly apply vendor patches or updates addressing this vulnerability. 8. Consider implementing anti-CSRF tokens in forms and verifying the Origin and Referer headers to ensure request legitimacy. 9. Regularly audit and review third-party plugins for security compliance before deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-52794: CWE-352 Cross-Site Request Forgery (CSRF) in Creative-Solutions Creative Contact Form
Description
Cross-Site Request Forgery (CSRF) vulnerability in Creative-Solutions Creative Contact Form allows Stored XSS. This issue affects Creative Contact Form: from n/a through 1.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-52794 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery, CSRF) affecting the Creative-Solutions Creative Contact Form plugin, specifically versions up to 1.0.0. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user by exploiting the lack of proper CSRF protections. This CSRF flaw enables the injection of stored Cross-Site Scripting (XSS) payloads into the contact form, which can then be executed in the context of users viewing the affected form or its submissions. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as tricking a user into visiting a malicious webpage. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the web application or user sessions. The impact includes low confidentiality, integrity, and availability losses (C:L/I:L/A:L), meaning an attacker can steal limited data, modify some content, or cause minor service disruptions. However, the stored XSS combined with CSRF can lead to persistent attacks, session hijacking, or further exploitation chains. No official patches or fixes have been published yet, and no known exploits are currently active in the wild. The vulnerability affects installations of the Creative Contact Form plugin, which is typically used on websites to manage user inquiries and contact submissions. The attack vector is network-based and does not require authentication, increasing the risk of exploitation if the plugin is widely deployed without mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for entities relying on the Creative Contact Form plugin for customer interaction, such as SMEs, e-commerce sites, and service providers. Exploitation could lead to unauthorized actions performed on behalf of users, including injection of malicious scripts that compromise user data confidentiality and integrity. Stored XSS could facilitate session hijacking, credential theft, or distribution of malware to site visitors, damaging brand reputation and potentially violating GDPR requirements concerning personal data protection. The availability impact is low but could still disrupt customer communication channels. Organizations with high web traffic or sensitive customer data are at greater risk. The lack of authentication requirement and remote exploitability means attackers can target these organizations without prior access, increasing the threat surface. Additionally, the persistent nature of stored XSS can lead to prolonged exposure and exploitation if not promptly addressed.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the Creative Contact Form plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF attempts and suspicious POST requests targeting the contact form endpoints. 3. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 4. Conduct thorough input validation and output encoding on all user-submitted data fields to prevent script injection. 5. Educate users and administrators about phishing and social engineering risks related to CSRF attacks. 6. Monitor web server logs for unusual POST requests or repeated access patterns indicative of exploitation attempts. 7. Once available, promptly apply vendor patches or updates addressing this vulnerability. 8. Consider implementing anti-CSRF tokens in forms and verifying the Origin and Referer headers to ensure request legitimacy. 9. Regularly audit and review third-party plugins for security compliance before deployment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-19T10:03:22.155Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68568e87aded773421b5abc8
Added to database: 6/21/2025, 10:50:47 AM
Last enriched: 6/21/2025, 10:52:19 AM
Last updated: 8/5/2025, 8:32:15 PM
Views: 17
Related Threats
CVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.