CVE-2025-60208: Cross-Site Request Forgery (CSRF) in Tusko Trush Advanced Custom Fields : CPT Options Pages
Cross-Site Request Forgery (CSRF) vulnerability in Tusko Trush Advanced Custom Fields : CPT Options Pages acf-cpt-options-pages allows Object Injection.This issue affects Advanced Custom Fields : CPT Options Pages: from n/a through <= 2.0.9.
AI Analysis
Technical Summary
CVE-2025-60208 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Tusko Trush Advanced Custom Fields : CPT Options Pages plugin, specifically affecting versions up to 2.0.9. The vulnerability enables attackers to trick authenticated users into submitting forged requests, which the plugin processes without proper verification, leading to unauthorized actions. The technical root cause involves insufficient anti-CSRF tokens or validation mechanisms in the plugin's CPT Options Pages functionality, allowing object injection attacks. Object injection can lead to arbitrary code execution, data manipulation, or privilege escalation depending on the context. The CVSS 3.1 score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction, and its high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a critical risk for websites using this plugin, especially those relying on Advanced Custom Fields for content management. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, increasing the potential attack surface. The vulnerability was reserved on 2025-09-25 and published on 2025-10-22, indicating recent disclosure without an available patch at the time of reporting.
Potential Impact
For European organizations, this vulnerability poses a significant threat, particularly to those using WordPress sites with the affected plugin. Successful exploitation can lead to unauthorized changes in website content, injection of malicious code, data breaches, or service disruptions. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational downtime. Sectors such as e-commerce, government, and media, which heavily rely on WordPress CMS, are at heightened risk. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously amplifies its impact. Additionally, the lack of required privileges means even low-privileged users or visitors can be leveraged in attacks, increasing the threat scope. Given the interconnected nature of European digital infrastructure, a successful attack could have cascading effects on supply chains and customer trust.
Mitigation Recommendations
1. Immediate action should be to monitor for plugin updates from Tusko Trush and apply patches as soon as they become available. 2. Until a patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin's endpoints. 3. Enforce strict CSRF token validation on all forms and requests related to CPT Options Pages, either by custom development or plugin hardening. 4. Limit user permissions to the minimum necessary, especially for users with access to plugin settings, to reduce the attack surface. 5. Conduct regular security audits and penetration testing focusing on WordPress plugins and their configurations. 6. Educate users and administrators about phishing and social engineering tactics that could facilitate CSRF attacks. 7. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 8. Monitor logs for unusual POST requests or changes in plugin-related data to detect exploitation attempts early. 9. Consider isolating critical WordPress instances or using containerization to limit potential damage.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60208: Cross-Site Request Forgery (CSRF) in Tusko Trush Advanced Custom Fields : CPT Options Pages
Description
Cross-Site Request Forgery (CSRF) vulnerability in Tusko Trush Advanced Custom Fields : CPT Options Pages acf-cpt-options-pages allows Object Injection.This issue affects Advanced Custom Fields : CPT Options Pages: from n/a through <= 2.0.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-60208 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Tusko Trush Advanced Custom Fields : CPT Options Pages plugin, specifically affecting versions up to 2.0.9. The vulnerability enables attackers to trick authenticated users into submitting forged requests, which the plugin processes without proper verification, leading to unauthorized actions. The technical root cause involves insufficient anti-CSRF tokens or validation mechanisms in the plugin's CPT Options Pages functionality, allowing object injection attacks. Object injection can lead to arbitrary code execution, data manipulation, or privilege escalation depending on the context. The CVSS 3.1 score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, no privileges required, but requiring user interaction, and its high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a critical risk for websites using this plugin, especially those relying on Advanced Custom Fields for content management. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, increasing the potential attack surface. The vulnerability was reserved on 2025-09-25 and published on 2025-10-22, indicating recent disclosure without an available patch at the time of reporting.
Potential Impact
For European organizations, this vulnerability poses a significant threat, particularly to those using WordPress sites with the affected plugin. Successful exploitation can lead to unauthorized changes in website content, injection of malicious code, data breaches, or service disruptions. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational downtime. Sectors such as e-commerce, government, and media, which heavily rely on WordPress CMS, are at heightened risk. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously amplifies its impact. Additionally, the lack of required privileges means even low-privileged users or visitors can be leveraged in attacks, increasing the threat scope. Given the interconnected nature of European digital infrastructure, a successful attack could have cascading effects on supply chains and customer trust.
Mitigation Recommendations
1. Immediate action should be to monitor for plugin updates from Tusko Trush and apply patches as soon as they become available. 2. Until a patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin's endpoints. 3. Enforce strict CSRF token validation on all forms and requests related to CPT Options Pages, either by custom development or plugin hardening. 4. Limit user permissions to the minimum necessary, especially for users with access to plugin settings, to reduce the attack surface. 5. Conduct regular security audits and penetration testing focusing on WordPress plugins and their configurations. 6. Educate users and administrators about phishing and social engineering tactics that could facilitate CSRF attacks. 7. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 8. Monitor logs for unusual POST requests or changes in plugin-related data to detect exploitation attempts early. 9. Consider isolating critical WordPress instances or using containerization to limit potential damage.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:42.280Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8eff604677bbd79439a9a
Added to database: 10/22/2025, 2:53:42 PM
Last enriched: 1/20/2026, 9:50:10 PM
Last updated: 2/7/2026, 2:06:53 PM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.