Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52835: CWE-352 Cross-Site Request Forgery (CSRF) in ConoHa by GMO WING WordPress Migrator

0
Critical
VulnerabilityCVE-2025-52835cvecve-2025-52835cwe-352
Published: Tue Dec 30 2025 (12/30/2025, 16:48:13 UTC)
Source: CVE Database V5
Vendor/Project: ConoHa by GMO
Product: WING WordPress Migrator

Description

Cross-Site Request Forgery (CSRF) vulnerability in ConoHa by GMO WING WordPress Migrator allows Upload a Web Shell to a Web Server.This issue affects WING WordPress Migrator: from n/a through 1.1.9.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:32:57 UTC

Technical Analysis

CVE-2025-52835 is a critical security vulnerability classified under CWE-352 (Cross-Site Request Forgery) found in the ConoHa by GMO WING WordPress Migrator plugin, affecting all versions up to 1.1.9. The vulnerability allows an attacker to exploit the lack of proper CSRF protections to upload a malicious web shell onto the target web server. This is achieved by tricking an authenticated user into submitting a crafted request, which the vulnerable plugin processes without verifying the legitimacy of the request origin. The consequence is severe: an attacker can gain remote code execution capabilities by uploading a web shell, leading to full compromise of the web server, including confidentiality breaches, data manipulation, and service disruption. The CVSS v3.1 score of 9.6 reflects the vulnerability's critical nature, with an attack vector over the network, low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that exploitation affects resources beyond the initially vulnerable component. Although no public exploits have been reported yet, the potential impact warrants urgent remediation. The vulnerability is particularly relevant for organizations using WordPress sites migrated or managed via the ConoHa by GMO WING WordPress Migrator plugin, which is popular in certain hosting environments. The lack of available patches at the time of publication necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-52835 is significant. Successful exploitation can lead to unauthorized remote code execution on web servers hosting WordPress sites, resulting in data breaches, defacement, malware distribution, and potential lateral movement within corporate networks. This can compromise sensitive customer data, intellectual property, and disrupt business operations. Given the widespread use of WordPress across Europe and the increasing adoption of cloud hosting and migration tools like ConoHa by GMO WING WordPress Migrator, many organizations could be exposed. The critical severity and ease of exploitation (no authentication required, only user interaction) increase the likelihood of targeted attacks or opportunistic exploitation. Additionally, the ability to upload web shells can facilitate persistent access and further attacks such as ransomware deployment. The reputational damage and regulatory consequences under GDPR for data breaches are also considerable. Organizations in sectors such as finance, healthcare, and government are particularly at risk due to the sensitivity of their data and services.

Mitigation Recommendations

1. Immediately monitor for any suspicious HTTP requests or file uploads related to the WordPress Migrator plugin and web shell indicators. 2. Implement strict CSRF protections at the web application firewall (WAF) or reverse proxy level to block unauthorized cross-site requests targeting the migrator plugin endpoints. 3. Restrict file upload permissions and validate all uploads rigorously, including MIME type and file content inspection, to prevent web shell uploads. 4. Disable or remove the WING WordPress Migrator plugin if not actively used until a security patch is released. 5. Apply the official security patch from ConoHa by GMO as soon as it becomes available. 6. Educate users and administrators about the risks of interacting with untrusted links or sites that could trigger CSRF attacks. 7. Employ network segmentation and least privilege principles to limit the impact of a compromised web server. 8. Conduct regular security audits and penetration testing focusing on web application vulnerabilities and plugin security. 9. Use multi-factor authentication (MFA) for administrative access to WordPress and hosting control panels to reduce risk from compromised credentials. 10. Maintain up-to-date backups to enable recovery in case of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:03:50.594Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a2db813ff03e2be072

Added to database: 12/30/2025, 10:22:26 PM

Last enriched: 1/20/2026, 8:32:57 PM

Last updated: 2/21/2026, 2:17:24 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats