Skip to main content

CVE-2025-57893: CWE-352 Cross-Site Request Forgery (CSRF) in Epsiloncool WP Fast Total Search

Medium
VulnerabilityCVE-2025-57893cvecve-2025-57893cwe-352
Published: Fri Aug 22 2025 (08/22/2025, 11:59:58 UTC)
Source: CVE Database V5
Vendor/Project: Epsiloncool
Product: WP Fast Total Search

Description

Cross-Site Request Forgery (CSRF) vulnerability in Epsiloncool WP Fast Total Search allows Cross Site Request Forgery. This issue affects WP Fast Total Search: from n/a through 1.79.270.

AI-Powered Analysis

AILast updated: 08/22/2025, 12:33:53 UTC

Technical Analysis

CVE-2025-57893 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'WP Fast Total Search' developed by Epsiloncool. This vulnerability affects versions up to 1.79.270. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application in which they are currently authenticated. In this case, the vulnerability permits unauthorized commands to be transmitted from a user that the web application trusts, potentially allowing an attacker to perform actions on behalf of the user without their consent. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. Since this plugin is used in WordPress environments to enhance search functionality, exploitation could allow attackers to manipulate search settings or other plugin-related configurations if the user is tricked into executing malicious requests.

Potential Impact

For European organizations using WordPress sites with the WP Fast Total Search plugin, this vulnerability could lead to unauthorized changes in search configurations or other plugin-managed settings, potentially degrading user experience or exposing the site to further attacks. While the direct impact on confidentiality and availability is low, integrity compromise could facilitate subsequent attacks or data manipulation. Organizations in sectors with high reliance on WordPress for customer-facing websites, such as e-commerce, media, and public services, could face reputational damage or operational disruptions if attackers leverage this vulnerability. Additionally, if attackers chain this CSRF with other vulnerabilities, the overall impact could escalate. Given the medium severity and requirement for user interaction, the risk is moderate but should not be ignored, especially for sites with privileged users frequently interacting with the plugin's features.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using the affected versions of WP Fast Total Search and monitor for official patches or updates from Epsiloncool. Until a patch is available, administrators should implement strict Content Security Policies (CSP) to limit the domains from which requests can be initiated and employ anti-CSRF tokens in custom integrations if possible. Additionally, restricting plugin access to trusted users and minimizing the number of users with administrative privileges reduces the attack surface. Web Application Firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts targeting the plugin's endpoints. Educating users about the risks of clicking on untrusted links while authenticated can also reduce the likelihood of successful exploitation. Regular security audits and monitoring of plugin behavior for unauthorized changes are recommended to detect potential exploitation early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-22T11:35:36.402Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a85feead5a09ad001ebe57

Added to database: 8/22/2025, 12:17:50 PM

Last enriched: 8/22/2025, 12:33:53 PM

Last updated: 8/22/2025, 3:22:49 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats