Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5933: CWE-352 Cross-Site Request Forgery (CSRF) in richarddev7 RD Contacto

0
Medium
VulnerabilityCVE-2025-5933cvecve-2025-5933cwe-352
Published: Fri Jul 04 2025 (07/04/2025, 01:44:00 UTC)
Source: CVE Database V5
Vendor/Project: richarddev7
Product: RD Contacto

Description

The RD Contacto plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the rdWappUpdateData() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:42:25 UTC

Technical Analysis

The RD Contacto plugin for WordPress, developed by richarddev7, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-5933. This vulnerability exists in all versions up to and including 1.4 due to missing or incorrect nonce validation in the rdWappUpdateData() function. Nonces are security tokens used to verify that requests originate from legitimate users; their absence or improper implementation allows attackers to craft malicious requests that, when executed by an authenticated administrator, can alter plugin settings without the administrator's intent. Since the vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link), attackers can exploit it remotely by social engineering site administrators. The vulnerability impacts the integrity of the plugin's configuration but does not compromise confidentiality or availability. The CVSS 3.1 base score of 4.3 reflects a medium severity, with an attack vector of network, low attack complexity, no privileges required, and user interaction necessary. No public exploits have been reported yet, but the risk remains for sites using vulnerable versions of the plugin. The lack of nonce validation is a common security oversight in WordPress plugins, emphasizing the need for secure coding practices. The vulnerability was published on July 4, 2025, and is tracked by Wordfence and the CVE database. No official patches or updates are linked yet, so mitigation requires manual intervention or plugin updates once available.

Potential Impact

The primary impact of CVE-2025-5933 is the unauthorized modification of RD Contacto plugin settings by an attacker without authentication, achieved through social engineering of site administrators. This can lead to altered plugin behavior, potential misconfiguration, or enabling of malicious features that could facilitate further attacks or degrade site functionality. While confidentiality and availability are not directly affected, integrity compromise can undermine trust in the website and potentially expose it to secondary attacks if the plugin controls critical contact or communication features. Organizations relying on RD Contacto for customer interaction or data collection may face operational disruptions or reputational damage. The ease of exploitation is moderate due to the need for user interaction but no authentication, making it a viable attack vector for targeted phishing campaigns. The scope is limited to WordPress sites using this specific plugin, but given WordPress's global popularity, the affected population could be substantial. No known exploits in the wild reduce immediate risk but do not eliminate it, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

To mitigate CVE-2025-5933, organizations should first verify if they use the RD Contacto plugin and identify the version in use. Immediate steps include: 1) Updating the plugin to a patched version once released by the vendor that correctly implements nonce validation in the rdWappUpdateData() function. 2) If no patch is available, temporarily disabling the plugin or restricting administrative access to trusted networks and users to reduce exposure. 3) Implementing web application firewall (WAF) rules to detect and block suspicious POST requests targeting the vulnerable function or plugin endpoints. 4) Educating site administrators about phishing and social engineering risks to prevent inadvertent clicks on malicious links. 5) Reviewing and hardening WordPress security configurations, including limiting administrator privileges and enabling multi-factor authentication to reduce the risk of compromised credentials. 6) Monitoring logs for unusual plugin configuration changes or access patterns. 7) For developers, ensuring all plugin functions that modify settings include proper nonce verification and adhere to WordPress security best practices before deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-09T15:17:16.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5f94

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 2/27/2026, 3:42:25 PM

Last updated: 3/24/2026, 11:20:12 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses