CVE-2025-58268: CWE-352 Cross-Site Request Forgery (CSRF) in WPMK WPMK PDF Generator
Cross-Site Request Forgery (CSRF) vulnerability in WPMK WPMK PDF Generator allows Stored XSS. This issue affects WPMK PDF Generator: from n/a through 1.0.1.
AI Analysis
Technical Summary
CVE-2025-58268 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPMK PDF Generator plugin, specifically affecting versions up to 1.0.1. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist in the application and execute when viewed by other users or administrators. The vulnerability is classified under CWE-352, indicating improper verification of the origin of requests. The CVSS v3.1 base score is 7.1, reflecting a high severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network without privileges or authentication, requires user interaction, and impacts confidentiality, integrity, and availability with low to moderate impact. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component. No patches or known exploits in the wild have been reported yet. The vulnerability arises because the plugin does not adequately verify the legitimacy of requests, allowing attackers to craft malicious requests that, when executed by authenticated users, result in stored XSS payloads. These payloads can be used to steal session tokens, perform actions on behalf of users, or compromise the integrity of the system.
Potential Impact
For European organizations using WordPress with the WPMK PDF Generator plugin, this vulnerability poses a significant risk. The stored XSS resulting from the CSRF attack can lead to session hijacking, unauthorized actions, and potential compromise of sensitive data. Given that the vulnerability requires user interaction but no authentication or privileges, attackers can target users with elevated permissions, such as administrators or editors, to escalate the impact. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Additionally, the ability to alter PDF generation processes could affect document integrity and compliance with regulatory requirements such as GDPR. The impact extends to availability if attackers leverage the vulnerability to perform denial-of-service or inject malicious content that disrupts workflows. Since WordPress is widely used across Europe, especially in small and medium enterprises and public sector websites, the threat is relevant and could be exploited in targeted attacks or broad phishing campaigns.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WPMK PDF Generator plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing Web Application Firewall (WAF) rules that detect and block CSRF attempts and suspicious POST requests targeting the plugin's endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers can mitigate the impact of stored XSS by restricting script execution sources. Organizations should also educate users, especially those with administrative privileges, about phishing and social engineering risks that could trigger the CSRF attack. Monitoring logs for unusual activity related to PDF generation or unexpected user actions can help detect exploitation attempts. Finally, maintaining up-to-date backups and testing incident response plans will prepare organizations to recover quickly if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-58268: CWE-352 Cross-Site Request Forgery (CSRF) in WPMK WPMK PDF Generator
Description
Cross-Site Request Forgery (CSRF) vulnerability in WPMK WPMK PDF Generator allows Stored XSS. This issue affects WPMK PDF Generator: from n/a through 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-58268 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPMK PDF Generator plugin, specifically affecting versions up to 1.0.1. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist in the application and execute when viewed by other users or administrators. The vulnerability is classified under CWE-352, indicating improper verification of the origin of requests. The CVSS v3.1 base score is 7.1, reflecting a high severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network without privileges or authentication, requires user interaction, and impacts confidentiality, integrity, and availability with low to moderate impact. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component. No patches or known exploits in the wild have been reported yet. The vulnerability arises because the plugin does not adequately verify the legitimacy of requests, allowing attackers to craft malicious requests that, when executed by authenticated users, result in stored XSS payloads. These payloads can be used to steal session tokens, perform actions on behalf of users, or compromise the integrity of the system.
Potential Impact
For European organizations using WordPress with the WPMK PDF Generator plugin, this vulnerability poses a significant risk. The stored XSS resulting from the CSRF attack can lead to session hijacking, unauthorized actions, and potential compromise of sensitive data. Given that the vulnerability requires user interaction but no authentication or privileges, attackers can target users with elevated permissions, such as administrators or editors, to escalate the impact. This can disrupt business operations, lead to data breaches, and damage organizational reputation. Additionally, the ability to alter PDF generation processes could affect document integrity and compliance with regulatory requirements such as GDPR. The impact extends to availability if attackers leverage the vulnerability to perform denial-of-service or inject malicious content that disrupts workflows. Since WordPress is widely used across Europe, especially in small and medium enterprises and public sector websites, the threat is relevant and could be exploited in targeted attacks or broad phishing campaigns.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WPMK PDF Generator plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing Web Application Firewall (WAF) rules that detect and block CSRF attempts and suspicious POST requests targeting the plugin's endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers can mitigate the impact of stored XSS by restricting script execution sources. Organizations should also educate users, especially those with administrative privileges, about phishing and social engineering risks that could trigger the CSRF attack. Monitoring logs for unusual activity related to PDF generation or unexpected user actions can help detect exploitation attempts. Finally, maintaining up-to-date backups and testing incident response plans will prepare organizations to recover quickly if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-08-27T16:20:02.775Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194cfa6a0abbafb7a3c47
Added to database: 9/22/2025, 6:26:23 PM
Last enriched: 9/30/2025, 1:13:19 AM
Last updated: 10/7/2025, 1:41:15 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.