Skip to main content

CVE-2025-58792: CWE-352 Cross-Site Request Forgery (CSRF) in WPKube Authors List

Medium
VulnerabilityCVE-2025-58792cvecve-2025-58792cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 13:45:01 UTC)
Source: CVE Database V5
Vendor/Project: WPKube
Product: Authors List

Description

Cross-Site Request Forgery (CSRF) vulnerability in WPKube Authors List allows Cross Site Request Forgery. This issue affects Authors List: from n/a through 2.0.6.1.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:22:57 UTC

Technical Analysis

CVE-2025-58792 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPKube Authors List plugin, affecting versions up to 2.0.6.1. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to a web application in which they are currently authenticated. In this case, the vulnerability enables an attacker to perform unauthorized actions on behalf of a logged-in user without their consent. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network without privileges, requires low attack complexity, and requires user interaction (such as clicking a malicious link). The impact is limited to integrity, with no confidentiality or availability impact. The scope remains unchanged, meaning the vulnerability affects only the vulnerable component without impacting other components. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web security weakness related to CSRF attacks. Given that WPKube Authors List is a WordPress plugin, the vulnerability primarily affects websites using this plugin for managing or displaying author information. Attackers could potentially exploit this flaw to perform unauthorized changes or actions within the plugin's functionality by tricking authenticated users into executing malicious requests.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the extent to which WPKube Authors List is deployed within their web infrastructure. Organizations running WordPress sites that utilize this plugin may face risks of unauthorized modifications to author-related data or settings, potentially leading to misinformation, defacement, or manipulation of content integrity. While the vulnerability does not compromise confidentiality or availability, the integrity impact could undermine trust in the affected websites, especially for media, publishing, or corporate sites relying on accurate author attribution. Additionally, if exploited in conjunction with other vulnerabilities or social engineering tactics, attackers might leverage this to escalate attacks or conduct phishing campaigns targeting users of the compromised sites. The requirement for user interaction means that exploitation is less straightforward but remains a viable threat vector, especially if attackers can lure authenticated users to malicious sites or emails. Overall, the threat poses moderate risk to European organizations with WordPress deployments using this plugin, particularly those with high public visibility or regulatory requirements for content integrity.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their WordPress installations to identify the presence and version of the WPKube Authors List plugin. 2) Monitor official WPKube channels and security advisories for the release of patches or updates addressing CVE-2025-58792, and apply them promptly once available. 3) Implement Web Application Firewall (WAF) rules that can detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 4) Employ anti-CSRF tokens and verify their presence and validation in all state-changing requests within the plugin, if custom development or plugin modification is feasible. 5) Educate users and administrators about the risks of clicking on unsolicited links or visiting untrusted websites while authenticated to sensitive systems. 6) Regularly review and limit user permissions within WordPress to minimize the impact of any compromised accounts. 7) Conduct periodic security assessments and penetration tests focusing on CSRF and other web vulnerabilities to detect and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:48:52.285Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa157c5b37b67a45fb9

Added to database: 9/5/2025, 1:50:25 PM

Last enriched: 9/5/2025, 2:22:57 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats