Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder

0
High
VulnerabilityCVE-2025-62886cvecve-2025-62886
Published: Mon Oct 27 2025 (10/27/2025, 01:33:44 UTC)
Source: CVE Database V5
Vendor/Project: wpdevart
Product: Pricing Table builder

Description

Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.

AI-Powered Analysis

AILast updated: 10/27/2025, 02:56:01 UTC

Technical Analysis

CVE-2025-62886 is a security vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, specifically versions up to and including 1.5.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables an attacker to trick an authenticated user into executing unwanted actions on their behalf within the WordPress admin context. This CSRF flaw leads to Stored Cross-Site Scripting (XSS), where malicious scripts can be permanently injected into the website's content or database. The attack vector involves an attacker crafting a malicious webpage or link that, when visited by an authenticated user (such as a site administrator), triggers unauthorized changes or script injections without the user's consent. Stored XSS can result in session hijacking, defacement, or distribution of malware to site visitors. The vulnerability was reserved on October 24, 2025, and published on October 27, 2025, but no CVSS score or patch has been released yet. The absence of a patch and public exploits suggests the vulnerability is newly disclosed and may be under active analysis or development by attackers. The wpdevart Pricing Table builder plugin is used to create pricing tables on WordPress sites, commonly found on e-commerce, SaaS, and marketing websites. The vulnerability's impact is significant because it combines CSRF with stored XSS, increasing the attack's persistence and potential damage. Exploitation requires the victim to be logged into the WordPress backend, which limits the attack surface but still poses a high risk to site administrators and editors. The lack of authentication bypass means attackers must rely on social engineering or phishing to lure authenticated users to malicious content. Given the plugin's integration into WordPress, a widely used CMS in Europe, the vulnerability could affect a broad range of organizations if left unmitigated.

Potential Impact

For European organizations, the impact of CVE-2025-62886 can be substantial, especially for those relying on WordPress sites for business operations, marketing, or e-commerce. Successful exploitation could lead to persistent XSS attacks, enabling attackers to steal administrator credentials, hijack sessions, deface websites, or distribute malware to visitors. This undermines the confidentiality and integrity of the affected websites and can cause reputational damage, loss of customer trust, and potential regulatory penalties under GDPR if personal data is compromised. The availability of the site could also be affected if attackers inject disruptive scripts or deface content. Organizations with multiple WordPress sites or those using the wpdevart Pricing Table builder extensively are at higher risk. The requirement for user authentication to exploit the vulnerability somewhat limits the attack scope but does not eliminate the risk, as social engineering can be used to target site administrators. The lack of a patch increases the urgency for proactive mitigation. Given Europe's strong regulatory environment and the importance of digital presence for businesses, this vulnerability could have wide-reaching operational and compliance consequences if exploited.

Mitigation Recommendations

1. Immediately audit all WordPress installations for the presence of the wpdevart Pricing Table builder plugin and identify affected versions (<=1.5.1). 2. Disable or uninstall the plugin temporarily until an official patch is released. 3. Monitor wpdevart and trusted security advisories for patch announcements and apply updates promptly. 4. Implement strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and reduce XSS impact. 5. Educate WordPress administrators and editors about phishing and social engineering risks to prevent inadvertent exploitation. 6. Restrict administrative access to trusted networks or VPNs to reduce exposure to malicious CSRF attempts. 7. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF or XSS payloads targeting the plugin endpoints. 8. Regularly back up WordPress sites and databases to enable quick recovery in case of compromise. 9. Conduct security audits and penetration tests focusing on CSRF and XSS vulnerabilities in WordPress plugins. 10. Consider implementing multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of credential theft.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:07.765Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed02d23a7bbed324acb2d

Added to database: 10/27/2025, 1:51:41 AM

Last enriched: 10/27/2025, 2:56:01 AM

Last updated: 10/29/2025, 7:56:34 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats