CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.
AI Analysis
Technical Summary
CVE-2025-62886 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, affecting all versions up to and including 1.5.1. The vulnerability enables an attacker to trick authenticated users into submitting forged requests that the server trusts, resulting in stored Cross-Site Scripting (XSS). Stored XSS allows malicious scripts to be permanently injected into the affected website, which can then execute in the browsers of visitors or administrators, potentially leading to session hijacking, data theft, or site defacement. The CVSS 3.1 score of 8.8 reflects a high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality, integrity, and availability, as attackers can manipulate site content and potentially escalate privileges. Although no exploits are currently known in the wild, the vulnerability's nature and the widespread use of WordPress and its plugins make it a significant threat. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate attention from site administrators. The vulnerability was reserved and published in late October 2025, with technical details assigned by Patchstack.
Potential Impact
For European organizations, especially those operating public-facing WordPress websites using the wpdevart Pricing Table builder plugin, this vulnerability poses a substantial risk. Exploitation can lead to unauthorized modification of website content, injection of malicious scripts, theft of user credentials, and potential spread of malware to site visitors. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data exposure), and cause operational disruptions. E-commerce and service providers relying on accurate pricing information may suffer financial losses and customer trust erosion. The vulnerability's ability to compromise confidentiality, integrity, and availability means that critical business functions hosted on affected sites could be severely impacted. Additionally, attackers could leverage the stored XSS to pivot attacks against internal networks if administrators access the site from corporate environments. The lack of known exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that exploitation would be impactful and relatively straightforward once a working exploit is developed.
Mitigation Recommendations
1. Monitor for official patches or updates from wpdevart and apply them immediately once available to remediate the vulnerability. 2. In the interim, implement Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns targeting the Pricing Table builder plugin endpoints. 3. Enforce strict CSRF tokens on all forms and AJAX requests related to the plugin to prevent unauthorized request forgery. 4. Conduct a thorough audit of existing pricing tables and plugin data to identify and remove any malicious scripts that may have been injected. 5. Limit administrative access to the WordPress backend to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking. 6. Educate users and administrators about phishing and social engineering risks that could facilitate CSRF exploitation. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 9. Monitor website logs for unusual activities, such as unexpected POST requests or changes to pricing tables, to detect early signs of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder
Description
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-62886 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, affecting all versions up to and including 1.5.1. The vulnerability enables an attacker to trick authenticated users into submitting forged requests that the server trusts, resulting in stored Cross-Site Scripting (XSS). Stored XSS allows malicious scripts to be permanently injected into the affected website, which can then execute in the browsers of visitors or administrators, potentially leading to session hijacking, data theft, or site defacement. The CVSS 3.1 score of 8.8 reflects a high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality, integrity, and availability, as attackers can manipulate site content and potentially escalate privileges. Although no exploits are currently known in the wild, the vulnerability's nature and the widespread use of WordPress and its plugins make it a significant threat. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate attention from site administrators. The vulnerability was reserved and published in late October 2025, with technical details assigned by Patchstack.
Potential Impact
For European organizations, especially those operating public-facing WordPress websites using the wpdevart Pricing Table builder plugin, this vulnerability poses a substantial risk. Exploitation can lead to unauthorized modification of website content, injection of malicious scripts, theft of user credentials, and potential spread of malware to site visitors. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data exposure), and cause operational disruptions. E-commerce and service providers relying on accurate pricing information may suffer financial losses and customer trust erosion. The vulnerability's ability to compromise confidentiality, integrity, and availability means that critical business functions hosted on affected sites could be severely impacted. Additionally, attackers could leverage the stored XSS to pivot attacks against internal networks if administrators access the site from corporate environments. The lack of known exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that exploitation would be impactful and relatively straightforward once a working exploit is developed.
Mitigation Recommendations
1. Monitor for official patches or updates from wpdevart and apply them immediately once available to remediate the vulnerability. 2. In the interim, implement Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns targeting the Pricing Table builder plugin endpoints. 3. Enforce strict CSRF tokens on all forms and AJAX requests related to the plugin to prevent unauthorized request forgery. 4. Conduct a thorough audit of existing pricing tables and plugin data to identify and remove any malicious scripts that may have been injected. 5. Limit administrative access to the WordPress backend to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking. 6. Educate users and administrators about phishing and social engineering risks that could facilitate CSRF exploitation. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 9. Monitor website logs for unusual activities, such as unexpected POST requests or changes to pricing tables, to detect early signs of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:24:07.765Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed02d23a7bbed324acb2d
Added to database: 10/27/2025, 1:51:41 AM
Last enriched: 11/13/2025, 12:14:21 PM
Last updated: 12/14/2025, 9:52:30 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.