CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.
AI Analysis
Technical Summary
CVE-2025-62886 is a critical security vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, versions up to and including 1.5.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF vulnerability leads to stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the affected website and executed in the context of users' browsers. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is unchanged, meaning the vulnerability affects the same security authority. The impact on confidentiality, integrity, and availability is high, as attackers can steal sensitive data, manipulate site content, or disrupt service. The vulnerability affects WordPress sites using the wpdevart Pricing Table builder plugin, a tool commonly used to create pricing tables for websites. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and reserved in the CVE database. The lack of patches increases the urgency for defensive measures. Given WordPress's popularity in Europe, particularly among SMEs and e-commerce platforms, this vulnerability poses a significant threat to organizations relying on this plugin for their web presence.
Potential Impact
For European organizations, the impact of CVE-2025-62886 can be severe. Exploitation can lead to unauthorized changes on websites, data theft, session hijacking, and defacement, damaging brand reputation and customer trust. E-commerce sites using the plugin risk financial fraud and leakage of customer payment information. Stored XSS can facilitate further attacks such as malware distribution or phishing campaigns targeting site visitors. The vulnerability's ease of exploitation without authentication means attackers can operate at scale, increasing the risk of widespread compromise. Regulatory implications under GDPR are significant, as data breaches involving personal data could lead to heavy fines and legal consequences. Organizations with limited cybersecurity resources may find detection and remediation challenging, increasing the likelihood of prolonged exposure. The threat also extends to internal users if attackers leverage the vulnerability to escalate privileges or move laterally within networks. Overall, the vulnerability threatens confidentiality, integrity, and availability of web assets critical to European businesses and public sector entities.
Mitigation Recommendations
1. Immediate monitoring for unusual or unauthorized changes on websites using the wpdevart Pricing Table builder plugin. 2. Apply vendor patches or updates as soon as they become available; if no patch exists, consider disabling or removing the plugin temporarily. 3. Implement strict anti-CSRF tokens in all forms and state-changing requests within the plugin or site code. 4. Employ Content Security Policy (CSP) headers to limit the impact of stored XSS by restricting script execution sources. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 6. Educate users and administrators about phishing and social engineering risks that could trigger CSRF attacks. 7. Use Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns targeting WordPress sites. 8. Restrict administrative access to trusted IPs and enforce strong multi-factor authentication to reduce risk from compromised accounts. 9. Backup website data regularly to enable quick restoration in case of compromise. 10. Engage with the plugin vendor and security community to stay informed about updates and exploit developments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-62886: Cross-Site Request Forgery (CSRF) in wpdevart Pricing Table builder
Description
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Pricing Table builder wpdevart-pricing-table allows Stored XSS.This issue affects Pricing Table builder: from n/a through <= 1.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-62886 is a critical security vulnerability identified in the wpdevart Pricing Table builder WordPress plugin, versions up to and including 1.5.1. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF vulnerability leads to stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the affected website and executed in the context of users' browsers. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is unchanged, meaning the vulnerability affects the same security authority. The impact on confidentiality, integrity, and availability is high, as attackers can steal sensitive data, manipulate site content, or disrupt service. The vulnerability affects WordPress sites using the wpdevart Pricing Table builder plugin, a tool commonly used to create pricing tables for websites. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and reserved in the CVE database. The lack of patches increases the urgency for defensive measures. Given WordPress's popularity in Europe, particularly among SMEs and e-commerce platforms, this vulnerability poses a significant threat to organizations relying on this plugin for their web presence.
Potential Impact
For European organizations, the impact of CVE-2025-62886 can be severe. Exploitation can lead to unauthorized changes on websites, data theft, session hijacking, and defacement, damaging brand reputation and customer trust. E-commerce sites using the plugin risk financial fraud and leakage of customer payment information. Stored XSS can facilitate further attacks such as malware distribution or phishing campaigns targeting site visitors. The vulnerability's ease of exploitation without authentication means attackers can operate at scale, increasing the risk of widespread compromise. Regulatory implications under GDPR are significant, as data breaches involving personal data could lead to heavy fines and legal consequences. Organizations with limited cybersecurity resources may find detection and remediation challenging, increasing the likelihood of prolonged exposure. The threat also extends to internal users if attackers leverage the vulnerability to escalate privileges or move laterally within networks. Overall, the vulnerability threatens confidentiality, integrity, and availability of web assets critical to European businesses and public sector entities.
Mitigation Recommendations
1. Immediate monitoring for unusual or unauthorized changes on websites using the wpdevart Pricing Table builder plugin. 2. Apply vendor patches or updates as soon as they become available; if no patch exists, consider disabling or removing the plugin temporarily. 3. Implement strict anti-CSRF tokens in all forms and state-changing requests within the plugin or site code. 4. Employ Content Security Policy (CSP) headers to limit the impact of stored XSS by restricting script execution sources. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 6. Educate users and administrators about phishing and social engineering risks that could trigger CSRF attacks. 7. Use Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns targeting WordPress sites. 8. Restrict administrative access to trusted IPs and enforce strong multi-factor authentication to reduce risk from compromised accounts. 9. Backup website data regularly to enable quick restoration in case of compromise. 10. Engage with the plugin vendor and security community to stay informed about updates and exploit developments.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:24:07.765Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed02d23a7bbed324acb2d
Added to database: 10/27/2025, 1:51:41 AM
Last enriched: 1/20/2026, 10:44:48 PM
Last updated: 2/6/2026, 6:55:33 PM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24418: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2026-24417: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2026-24416: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2025-69216: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2025-69214: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.