Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60134: Cross-Site Request Forgery (CSRF) in John James Jacoby WP Media Categories

0
Medium
VulnerabilityCVE-2025-60134cvecve-2025-60134
Published: Wed Oct 22 2025 (10/22/2025, 14:32:41 UTC)
Source: CVE Database V5
Vendor/Project: John James Jacoby
Product: WP Media Categories

Description

Cross-Site Request Forgery (CSRF) vulnerability in John James Jacoby WP Media Categories wp-media-categories allows Cross Site Request Forgery.This issue affects WP Media Categories: from n/a through <= 2.1.0.

AI-Powered Analysis

AILast updated: 11/13/2025, 11:41:43 UTC

Technical Analysis

CVE-2025-60134 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP Media Categories plugin for WordPress, developed by John James Jacoby. This vulnerability affects all versions up to 2.1.0 and allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. CSRF attacks exploit the trust a web application has in a user's browser by tricking the user into submitting unwanted requests, potentially modifying media category settings within WordPress. The CVSS v3.1 base score is 5.3 (medium), with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality loss, with no integrity or availability impact reported. No known exploits are currently active in the wild. The vulnerability arises due to the plugin's failure to implement proper anti-CSRF protections such as nonce verification or token validation on sensitive actions. This allows attackers to craft malicious web pages or emails that, when visited by an authenticated WordPress user, execute unauthorized category modifications. The vulnerability is particularly relevant for websites relying on WP Media Categories for media organization, potentially leading to unauthorized content classification changes that could affect content management workflows or SEO. The vulnerability was reserved on 2025-09-25 and published on 2025-10-22, with no patch links currently available, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, the impact of CVE-2025-60134 primarily concerns unauthorized modification of media categories within WordPress sites using the affected plugin. While this does not directly compromise data confidentiality, integrity, or availability, it can disrupt content management processes, potentially leading to misclassification of media assets, confusion in content delivery, or indirect reputational damage. Organizations relying heavily on WordPress for public-facing websites, digital marketing, or content management may experience operational inefficiencies or SEO degradation if media categories are manipulated. Since exploitation requires no authentication or user interaction, attackers can remotely target users with active WordPress sessions, increasing the risk of automated or large-scale attacks. Although no known exploits exist yet, the vulnerability's presence in a widely used CMS plugin makes it a potential target for opportunistic attackers. European entities with strict data governance and compliance requirements should also consider the risk of unauthorized changes as a compliance concern, especially if media categorization affects regulated content. Overall, the impact is moderate but warrants timely mitigation to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2025-60134, European organizations should implement the following specific measures: 1) Monitor for and apply official patches or updates from the plugin developer as soon as they become available to address the CSRF vulnerability. 2) In the absence of patches, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting the WP Media Categories plugin endpoints. 3) Enforce strict user session management and limit administrative access to trusted personnel only, reducing the risk of session hijacking or exploitation. 4) Employ security plugins or custom code to add nonce verification or anti-CSRF tokens to all state-changing requests related to media categories. 5) Conduct regular security audits and vulnerability scans on WordPress installations to identify outdated plugins and configuration weaknesses. 6) Educate users and administrators about the risks of CSRF and encourage cautious behavior when browsing untrusted websites while logged into WordPress. 7) Restrict access to WordPress admin interfaces via IP whitelisting or VPNs where feasible to reduce exposure. These targeted actions go beyond generic advice by focusing on the specific vulnerability context and the operational environment of affected organizations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:34.879Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff504677bbd79439a75

Added to database: 10/22/2025, 2:53:41 PM

Last enriched: 11/13/2025, 11:41:43 AM

Last updated: 12/14/2025, 8:21:06 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats