Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58268: CWE-352 Cross-Site Request Forgery (CSRF) in WPMK WPMK PDF Generator

0
High
VulnerabilityCVE-2025-58268cvecve-2025-58268cwe-352
Published: Mon Sep 22 2025 (09/22/2025, 18:23:16 UTC)
Source: CVE Database V5
Vendor/Project: WPMK
Product: WPMK PDF Generator

Description

Cross-Site Request Forgery (CSRF) vulnerability in WPMK WPMK PDF Generator allows Stored XSS. This issue affects WPMK PDF Generator: from n/a through 1.0.1.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:13:19 UTC

Technical Analysis

CVE-2025-58268 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPMK PDF Generator plugin, specifically affecting versions up to 1.0.1. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist in the application and execute when viewed by other users or administrators. The vulnerability is classified under CWE-352, indicating improper verification of the origin of requests. The CVSS v3.1 base score is 7.1, reflecting a high severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network without privileges or authentication, requires user interaction, and impacts confidentiality, integrity, and availability with low to moderate impact. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component. No patches or known exploits in the wild have been reported yet. The vulnerability arises because the plugin does not adequately verify the legitimacy of requests, allowing attackers to craft malicious requests that, when executed by authenticated users, result in stored XSS payloads. These payloads can be used to steal session tokens, perform actions on behalf of users, or compromise the integrity of the system.

Potential Impact

For European organizations using WordPress with the WPMK PDF Generator plugin, this vulnerability poses a significant risk. The stored XSS resulting from the CSRF attack can lead to session hijacking, unauthorized actions, and potential compromise of sensitive data. Given that the vulnerability requires user interaction but no authentication or privileges, attackers can target users with elevated permissions, such as administrators or editors, to escalate the impact. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Additionally, the ability to alter PDF generation processes could affect document integrity and compliance with regulatory requirements such as GDPR. The impact extends to availability if attackers leverage the vulnerability to perform denial-of-service or inject malicious content that disrupts workflows. Since WordPress is widely used across Europe, especially in small and medium enterprises and public sector websites, the threat is relevant and could be exploited in targeted attacks or broad phishing campaigns.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the WPMK PDF Generator plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing Web Application Firewall (WAF) rules that detect and block CSRF attempts and suspicious POST requests targeting the plugin's endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers can mitigate the impact of stored XSS by restricting script execution sources. Organizations should also educate users, especially those with administrative privileges, about phishing and social engineering risks that could trigger the CSRF attack. Monitoring logs for unusual activity related to PDF generation or unexpected user actions can help detect exploitation attempts. Finally, maintaining up-to-date backups and testing incident response plans will prepare organizations to recover quickly if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-27T16:20:02.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194cfa6a0abbafb7a3c47

Added to database: 9/22/2025, 6:26:23 PM

Last enriched: 9/30/2025, 1:13:19 AM

Last updated: 10/7/2025, 1:41:15 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats