Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60208: Cross-Site Request Forgery (CSRF) in Tusko Trush Advanced Custom Fields : CPT Options Pages

0
High
VulnerabilityCVE-2025-60208cvecve-2025-60208
Published: Wed Oct 22 2025 (10/22/2025, 14:32:42 UTC)
Source: CVE Database V5
Vendor/Project: Tusko Trush
Product: Advanced Custom Fields : CPT Options Pages

Description

Cross-Site Request Forgery (CSRF) vulnerability in Tusko Trush Advanced Custom Fields : CPT Options Pages acf-cpt-options-pages allows Object Injection.This issue affects Advanced Custom Fields : CPT Options Pages: from n/a through <= 2.0.9.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:50:10 UTC

Technical Analysis

CVE-2025-60208 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Tusko Trush Advanced Custom Fields : CPT Options Pages plugin, specifically affecting versions up to 2.0.9. The vulnerability enables attackers to trick authenticated users into submitting forged requests, which the plugin processes without proper verification, leading to unauthorized actions. The technical root cause involves insufficient anti-CSRF tokens or validation mechanisms in the plugin's CPT Options Pages functionality, allowing object injection attacks. Object injection can lead to arbitrary code execution, data manipulation, or privilege escalation depending on the context. The CVSS 3.1 score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction, and its high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a critical risk for websites using this plugin, especially those relying on Advanced Custom Fields for content management. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, increasing the potential attack surface. The vulnerability was reserved on 2025-09-25 and published on 2025-10-22, indicating recent disclosure without an available patch at the time of reporting.

Potential Impact

For European organizations, this vulnerability poses a significant threat, particularly to those using WordPress sites with the affected plugin. Successful exploitation can lead to unauthorized changes in website content, injection of malicious code, data breaches, or service disruptions. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational downtime. Sectors such as e-commerce, government, and media, which heavily rely on WordPress CMS, are at heightened risk. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously amplifies its impact. Additionally, the lack of required privileges means even low-privileged users or visitors can be leveraged in attacks, increasing the threat scope. Given the interconnected nature of European digital infrastructure, a successful attack could have cascading effects on supply chains and customer trust.

Mitigation Recommendations

1. Immediate action should be to monitor for plugin updates from Tusko Trush and apply patches as soon as they become available. 2. Until a patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin's endpoints. 3. Enforce strict CSRF token validation on all forms and requests related to CPT Options Pages, either by custom development or plugin hardening. 4. Limit user permissions to the minimum necessary, especially for users with access to plugin settings, to reduce the attack surface. 5. Conduct regular security audits and penetration testing focusing on WordPress plugins and their configurations. 6. Educate users and administrators about phishing and social engineering tactics that could facilitate CSRF attacks. 7. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 8. Monitor logs for unusual POST requests or changes in plugin-related data to detect exploitation attempts early. 9. Consider isolating critical WordPress instances or using containerization to limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:42.280Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff604677bbd79439a9a

Added to database: 10/22/2025, 2:53:42 PM

Last enriched: 1/20/2026, 9:50:10 PM

Last updated: 2/6/2026, 4:40:52 AM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats