Skip to main content

CVE-2025-58847: CWE-352 Cross-Site Request Forgery (CSRF) in Yaidier WN Flipbox Pro

High
VulnerabilityCVE-2025-58847cvecve-2025-58847cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 13:45:33 UTC)
Source: CVE Database V5
Vendor/Project: Yaidier
Product: WN Flipbox Pro

Description

Cross-Site Request Forgery (CSRF) vulnerability in Yaidier WN Flipbox Pro allows Reflected XSS. This issue affects WN Flipbox Pro: from n/a through 2.1.

AI-Powered Analysis

AILast updated: 09/05/2025, 13:57:54 UTC

Technical Analysis

CVE-2025-58847 is a high-severity vulnerability affecting Yaidier's WN Flipbox Pro plugin, specifically versions up to 2.1. The vulnerability is classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) flaw. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the CSRF vulnerability in WN Flipbox Pro also enables reflected Cross-Site Scripting (XSS) attacks, which can be leveraged to execute malicious scripts in the context of the victim's browser. The CVSS 3.1 base score of 7.1 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact on confidentiality, integrity, and availability is low to moderate (C:L, I:L, A:L), suggesting that while the attacker can cause some data disclosure, modification, or disruption, it is not total or catastrophic. The vulnerability is present because the plugin does not properly verify the authenticity of requests, allowing attackers to craft malicious links or forms that, when visited or submitted by an authenticated user, execute unintended actions. The reflected XSS component can be used to steal session tokens, perform phishing, or further exploit the victim's browser. No patches or fixes have been published yet, and there are no known exploits in the wild at the time of publication. The vulnerability was publicly disclosed on September 5, 2025.

Potential Impact

For European organizations using the WN Flipbox Pro plugin, this vulnerability poses a significant risk, especially for websites that rely on this plugin for interactive UI elements. Successful exploitation could lead to unauthorized actions performed on behalf of legitimate users, potentially resulting in data leakage, unauthorized changes to website content or configurations, and disruption of service availability. The reflected XSS aspect increases the risk by enabling attackers to hijack user sessions or conduct targeted phishing attacks against users of the affected sites. Organizations handling sensitive user data or financial transactions are particularly at risk, as attackers could leverage CSRF to manipulate transactions or access confidential information. Additionally, the scope change in the CVSS vector indicates that the impact could extend beyond the plugin itself, potentially affecting other components or user data within the web application. Given the lack of patches, organizations remain exposed until mitigations are applied. The requirement for user interaction means that social engineering or phishing campaigns could be used to increase the likelihood of successful exploitation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all instances of the WN Flipbox Pro plugin in their web environments. Until an official patch is released, organizations should implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce the impact of reflected XSS. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious CSRF and XSS payloads targeting the plugin's endpoints. Administrators should enforce multi-factor authentication (MFA) for user accounts with elevated privileges to reduce the risk of session hijacking. It is also advisable to implement anti-CSRF tokens in all forms and state-changing requests if possible, or temporarily disable the plugin if it is not critical to operations. User awareness training should be enhanced to educate users about the risks of clicking on unsolicited links, which could trigger CSRF attacks. Monitoring and logging should be intensified to detect unusual user activities that may indicate exploitation attempts. Finally, organizations should stay alert for official patches or updates from Yaidier and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:49:49.115Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa557c5b37b67a46119

Added to database: 9/5/2025, 1:50:29 PM

Last enriched: 9/5/2025, 1:57:54 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats