Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62134: CWE-352 Cross-Site Request Forgery (CSRF) in A WP Life Contact Form Widget

0
Medium
VulnerabilityCVE-2025-62134cvecve-2025-62134cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 13:53:35 UTC)
Source: CVE Database V5
Vendor/Project: A WP Life
Product: Contact Form Widget

Description

Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Contact Form Widget allows Cross Site Request Forgery.This issue affects Contact Form Widget: from n/a through 1.5.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:30:17 UTC

Technical Analysis

CVE-2025-62134 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the A WP Life Contact Form Widget, a WordPress plugin used to embed contact forms on websites. The vulnerability exists in versions up to 1.5.1 and allows an attacker to craft malicious web requests that, when visited by an authenticated user, cause the user’s browser to execute unintended actions on the vulnerable site without their consent. This occurs because the widget does not properly verify the origin or authenticity of requests, lacking anti-CSRF protections such as tokens or referer validation. The vulnerability impacts the integrity and availability of the affected website by enabling unauthorized changes or disruptions through forged requests. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) indicates that the attack can be performed remotely over the network with low complexity, requires no privileges, but does require user interaction (e.g., clicking a link). The scope remains unchanged, and the impact affects integrity and availability but not confidentiality. No patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The widget is commonly used in WordPress sites, which are widespread globally, including Europe.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized actions on websites that use the A WP Life Contact Form Widget, such as altering form submissions, disrupting contact processes, or causing denial of service conditions. This can degrade user trust, impact customer communications, and potentially lead to reputational damage. Organizations relying on these forms for business-critical communications or customer engagement may experience operational disruptions. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to exploit it, increasing risk in sectors with high web presence such as e-commerce, government portals, and service providers. The lack of confidentiality impact reduces risk of data leakage, but integrity and availability impacts remain significant for service reliability and user experience.

Mitigation Recommendations

1. Monitor for official patches or updates from the A WP Life plugin developers and apply them immediately once available. 2. Implement web application firewall (WAF) rules to detect and block suspicious cross-site requests targeting the contact form endpoints. 3. Add or enforce anti-CSRF tokens in form submissions to ensure requests are legitimate and originate from authorized users. 4. Restrict access to the widget’s administrative functions to trusted users only and limit permissions where possible. 5. Educate users and administrators about the risks of clicking unsolicited links that could trigger CSRF attacks. 6. Regularly audit and review WordPress plugins for security compliance and remove or replace outdated or unsupported plugins. 7. Employ Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could facilitate CSRF attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:41.481Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69552c1edb813ff03eeb80da

Added to database: 12/31/2025, 1:58:54 PM

Last enriched: 1/20/2026, 10:30:17 PM

Last updated: 2/7/2026, 12:57:23 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats