Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62112: CWE-352 Cross-Site Request Forgery (CSRF) in Merv Barrett Import into Easy Property Listings

0
Medium
VulnerabilityCVE-2025-62112cvecve-2025-62112cwe-352
Published: Tue Dec 30 2025 (12/30/2025, 16:21:30 UTC)
Source: CVE Database V5
Vendor/Project: Merv Barrett
Product: Import into Easy Property Listings

Description

Cross-Site Request Forgery (CSRF) vulnerability in Merv Barrett Import into Easy Property Listings allows Cross Site Request Forgery.This issue affects Import into Easy Property Listings: from n/a through 2.2.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:25:47 UTC

Technical Analysis

CVE-2025-62112 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the 'Import into Easy Property Listings' WordPress plugin developed by Merv Barrett, affecting versions up to 2.2.1. CSRF vulnerabilities occur when web applications fail to verify that state-changing requests originate from legitimate users, allowing attackers to trick authenticated users into submitting malicious requests unknowingly. In this case, the plugin lacks adequate CSRF protections, such as anti-CSRF tokens or origin checks, enabling attackers to craft malicious web pages or links that, when visited by an authenticated user, execute unauthorized actions within the plugin's context. The vulnerability impacts the integrity of the application by allowing unauthorized modifications but does not compromise confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction. No known exploits are currently in the wild, and no patches have been published. The vulnerability was reserved in October 2025 and published in December 2025. The plugin is commonly used in real estate websites to import property listings, making it a target for attackers aiming to manipulate listing data or disrupt business operations.

Potential Impact

For European organizations, particularly those operating real estate websites or platforms using the 'Import into Easy Property Listings' plugin, this vulnerability poses a risk of unauthorized data manipulation. Attackers could exploit the CSRF flaw to alter property listings, import incorrect data, or perform other unauthorized actions that compromise data integrity. While confidentiality and availability are not directly impacted, the integrity breach could lead to misinformation, reputational damage, and potential financial losses. Given the plugin's role in managing property listings, attackers might also use this vulnerability to insert fraudulent listings or disrupt normal business workflows. The requirement for user interaction means phishing or social engineering could be used to lure authenticated users into triggering the exploit. Organizations with high traffic real estate platforms or those relying heavily on this plugin for data import are at greater risk. The absence of patches increases exposure until mitigations are applied.

Mitigation Recommendations

To mitigate this CSRF vulnerability, organizations should implement several specific measures: 1) Apply or develop patches that introduce anti-CSRF tokens in all state-changing requests within the plugin, ensuring that each request includes a unique, unpredictable token verified server-side. 2) Enforce strict origin and referer header validation to confirm requests originate from trusted sources. 3) Restrict sensitive operations to POST requests and avoid processing state changes via GET requests. 4) Educate users about phishing risks and encourage cautious behavior when clicking on links, especially from untrusted sources. 5) If patches are unavailable, consider temporarily disabling the plugin or limiting its use to trusted environments. 6) Monitor web server and application logs for unusual or unauthorized requests targeting the plugin endpoints. 7) Keep WordPress core and all plugins updated to reduce the attack surface. 8) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the plugin. These steps go beyond generic advice by focusing on the plugin's specific context and operational environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:20.865Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a1db813ff03e2be038

Added to database: 12/30/2025, 10:22:25 PM

Last enriched: 1/20/2026, 10:25:47 PM

Last updated: 2/7/2026, 12:35:47 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats