Skip to main content

CVE-2025-58798: CWE-352 Cross-Site Request Forgery (CSRF) in Bjorn Manintveld BCM Duplicate Menu

Medium
VulnerabilityCVE-2025-58798cvecve-2025-58798cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 13:45:06 UTC)
Source: CVE Database V5
Vendor/Project: Bjorn Manintveld
Product: BCM Duplicate Menu

Description

Cross-Site Request Forgery (CSRF) vulnerability in Bjorn Manintveld BCM Duplicate Menu allows Cross Site Request Forgery. This issue affects BCM Duplicate Menu: from n/a through 1.1.2.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:21:01 UTC

Technical Analysis

CVE-2025-58798 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the BCM Duplicate Menu plugin developed by Bjorn Manintveld. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application in which the user is currently authenticated, thereby performing unwanted actions on behalf of the user without their consent. This specific vulnerability affects versions of BCM Duplicate Menu up to 1.1.2, though the exact affected versions are not fully enumerated. The vulnerability allows an attacker to craft a malicious web request that, when executed by an authenticated user, can cause unintended changes or actions within the BCM Duplicate Menu plugin. According to the CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), the attack can be launched remotely over the network without requiring privileges or authentication, but it does require user interaction (such as clicking a link). The impact is limited to integrity, meaning the attacker can cause unauthorized modifications but cannot affect confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a well-known web security weakness related to CSRF attacks. The medium severity rating (CVSS score 4.3) reflects the moderate risk posed by this vulnerability, primarily due to the need for user interaction and the limited scope of impact.

Potential Impact

For European organizations using the BCM Duplicate Menu plugin, this vulnerability poses a moderate risk. If exploited, attackers could manipulate plugin settings or duplicate menu entries without authorization, potentially leading to unauthorized changes in website navigation or content structure. While this does not directly compromise sensitive data confidentiality or cause service outages, it could facilitate further attacks such as phishing, social engineering, or privilege escalation by altering site behavior or misleading users. Organizations relying on this plugin for critical website functionality may experience reputational damage or operational disruptions if attackers exploit this vulnerability. The risk is heightened in sectors with high web presence such as e-commerce, media, and government websites. Since the attack requires user interaction, targeted phishing campaigns could be used to exploit this vulnerability, especially against employees or administrators with access to the affected systems.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and monitor the use of the BCM Duplicate Menu plugin on their websites and identify all instances and versions in use. 2) Apply any available patches or updates from the vendor as soon as they are released; if no patch is currently available, consider disabling or removing the plugin temporarily to eliminate exposure. 3) Implement anti-CSRF tokens in web forms and requests related to the plugin to ensure that requests are legitimate and initiated by authorized users. 4) Educate users and administrators about the risks of CSRF attacks and the importance of not clicking on suspicious links or visiting untrusted websites while authenticated. 5) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 6) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities, including CSRF, to detect and remediate similar issues proactively. 7) Monitor logs for unusual or unauthorized changes to menu configurations that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:49:01.959Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa157c5b37b67a45fe7

Added to database: 9/5/2025, 1:50:25 PM

Last enriched: 9/5/2025, 2:21:01 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats