Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5925: CWE-352 Cross-Site Request Forgery (CSRF) in steph Bunny’s Print CSS

0
Medium
VulnerabilityCVE-2025-5925cvecve-2025-5925cwe-352
Published: Tue Jun 10 2025 (06/10/2025, 03:41:37 UTC)
Source: CVE Database V5
Vendor/Project: steph
Product: Bunny’s Print CSS

Description

The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for unauthenticated attackers to update settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:40:16 UTC

Technical Analysis

CVE-2025-5925 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Bunny’s Print CSS plugin for WordPress, affecting all versions up to and including 0.95. The root cause is the absence or improper implementation of nonce validation in the pcss_options_subpanel() function, which is responsible for handling plugin settings updates. Nonces in WordPress are security tokens designed to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, attackers can craft malicious web requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), cause unauthorized changes to plugin settings. This vulnerability does not require the attacker to be authenticated but does require the administrator’s interaction, making social engineering a key component of exploitation. The CVSS v3.1 score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction and resulting in limited integrity impact without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been observed in the wild. However, the vulnerability poses a risk of unauthorized configuration changes that could be leveraged for further attacks or to degrade site functionality.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of plugin settings by attackers who can trick site administrators into executing malicious requests. While it does not directly compromise confidentiality or availability, unauthorized changes to plugin configurations can lead to degraded site performance, misbehavior of the plugin, or open pathways for additional attacks such as privilege escalation or persistent backdoors if combined with other vulnerabilities. For organizations relying on the Bunny’s Print CSS plugin, especially those with multiple administrators or high-value WordPress sites, this vulnerability could undermine trust in site integrity and lead to administrative overhead to detect and remediate unauthorized changes. Since exploitation requires administrator interaction, the risk is mitigated somewhat by user awareness but remains significant in environments with less vigilant administrators or targeted social engineering campaigns.

Mitigation Recommendations

To mitigate CVE-2025-5925, organizations should: 1) Immediately monitor for updates or patches from the plugin vendor and apply them as soon as available. 2) If no patch is available, implement compensating controls such as restricting administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 3) Educate administrators about the risks of clicking untrusted links and encourage the use of security awareness training focused on social engineering. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin’s settings endpoints. 5) Regularly audit plugin settings and WordPress administrative logs to detect unauthorized changes promptly. 6) Consider temporarily disabling or replacing the plugin if the risk is unacceptable and no patch is forthcoming. 7) Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack surface where possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-09T14:28:56.837Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f591b0bd07c3938aa54

Added to database: 6/10/2025, 6:54:17 PM

Last enriched: 2/27/2026, 3:40:16 PM

Last updated: 3/22/2026, 10:12:28 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses