Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder

0
High
VulnerabilityCVE-2025-62886cvecve-2025-62886
Published: Mon Oct 27 2025 (10/27/2025, 01:33:44 UTC)
Source: CVE Database V5
Vendor/Project: wpdevart
Product: Pricing Table builder

Description

Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:44:48 UTC

Technical Analysis

CVE-2025-62886 is a critical security vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, versions up to and including 1.5.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF vulnerability leads to stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the affected website and executed in the context of users' browsers. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is unchanged, meaning the vulnerability affects the same security authority. The impact on confidentiality, integrity, and availability is high, as attackers can steal sensitive data, manipulate site content, or disrupt service. The vulnerability affects WordPress sites using the wpdevart Pricing Table builder plugin, a tool commonly used to create pricing tables for websites. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and reserved in the CVE database. The lack of patches increases the urgency for defensive measures. Given WordPress's popularity in Europe, particularly among SMEs and e-commerce platforms, this vulnerability poses a significant threat to organizations relying on this plugin for their web presence.

Potential Impact

For European organizations, the impact of CVE-2025-62886 can be severe. Exploitation can lead to unauthorized changes on websites, data theft, session hijacking, and defacement, damaging brand reputation and customer trust. E-commerce sites using the plugin risk financial fraud and leakage of customer payment information. Stored XSS can facilitate further attacks such as malware distribution or phishing campaigns targeting site visitors. The vulnerability's ease of exploitation without authentication means attackers can operate at scale, increasing the risk of widespread compromise. Regulatory implications under GDPR are significant, as data breaches involving personal data could lead to heavy fines and legal consequences. Organizations with limited cybersecurity resources may find detection and remediation challenging, increasing the likelihood of prolonged exposure. The threat also extends to internal users if attackers leverage the vulnerability to escalate privileges or move laterally within networks. Overall, the vulnerability threatens confidentiality, integrity, and availability of web assets critical to European businesses and public sector entities.

Mitigation Recommendations

1. Immediate monitoring for unusual or unauthorized changes on websites using the wpdevart Pricing Table builder plugin. 2. Apply vendor patches or updates as soon as they become available; if no patch exists, consider disabling or removing the plugin temporarily. 3. Implement strict anti-CSRF tokens in all forms and state-changing requests within the plugin or site code. 4. Employ Content Security Policy (CSP) headers to limit the impact of stored XSS by restricting script execution sources. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 6. Educate users and administrators about phishing and social engineering risks that could trigger CSRF attacks. 7. Use Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns targeting WordPress sites. 8. Restrict administrative access to trusted IPs and enforce strong multi-factor authentication to reduce risk from compromised accounts. 9. Backup website data regularly to enable quick restoration in case of compromise. 10. Engage with the plugin vendor and security community to stay informed about updates and exploit developments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:07.765Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed02d23a7bbed324acb2d

Added to database: 10/27/2025, 1:51:41 AM

Last enriched: 1/20/2026, 10:44:48 PM

Last updated: 2/7/2026, 2:58:29 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats