CVE-2025-62934: Cross-Site Request Forgery (CSRF) in Mejar WP Business Hours
Cross-Site Request Forgery (CSRF) vulnerability in Mejar WP Business Hours wp-business-hours allows Stored XSS.This issue affects WP Business Hours: from n/a through <= 1.4.
AI Analysis
Technical Summary
CVE-2025-62934 is a vulnerability identified in the Mejar WP Business Hours plugin for WordPress, affecting versions up to 1.4. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF flaw facilitates Stored Cross-Site Scripting (XSS), where malicious scripts are injected and stored within the plugin's data, potentially affecting all users who view the compromised content. The vulnerability arises due to insufficient verification of the origin of requests, allowing attackers to craft malicious web pages that, when visited by an authenticated user, execute unauthorized commands on the vulnerable WordPress site. Stored XSS can lead to session hijacking, defacement, or redirection to malicious sites, severely impacting site integrity and user trust. Although no public exploits have been reported yet, the presence of stored XSS elevates the risk profile. The vulnerability affects a widely used plugin that manages business hours display, often installed on small and medium business websites. No CVSS score has been assigned, and no official patches are currently linked, indicating the need for immediate attention from site administrators. The vulnerability was published on October 27, 2025, with the assigner noted as Patchstack.
Potential Impact
For European organizations, especially SMEs relying on WordPress and the WP Business Hours plugin, this vulnerability poses significant risks. Exploitation could lead to unauthorized changes in plugin data, persistent XSS attacks compromising site visitors and administrators, and potential session hijacking. This undermines confidentiality by exposing user sessions and data, integrity by allowing unauthorized content injection, and availability if attackers disrupt site functionality. The impact is heightened in sectors where business hours and customer interaction are critical, such as retail, hospitality, and professional services. Additionally, compromised sites can be used as vectors for broader attacks or phishing campaigns targeting European users. The lack of authentication bypass means attackers must lure authenticated users to malicious sites, but given the common use of WordPress admin accounts, this is a realistic threat. The absence of known exploits provides a window for mitigation but should not lead to complacency.
Mitigation Recommendations
1. Immediately monitor for updates or patches released by Mejar for WP Business Hours and apply them promptly. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns targeting the plugin. 3. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS by restricting script execution sources. 4. Limit administrative access to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking. 5. Regularly audit and sanitize plugin data inputs and outputs to detect and remove malicious scripts. 6. Educate users and administrators about phishing and social engineering tactics that could trigger CSRF attacks. 7. Consider temporarily disabling the WP Business Hours plugin if immediate patching is not possible and business operations allow. 8. Employ security plugins that provide CSRF token validation and XSS protection for WordPress environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-62934: Cross-Site Request Forgery (CSRF) in Mejar WP Business Hours
Description
Cross-Site Request Forgery (CSRF) vulnerability in Mejar WP Business Hours wp-business-hours allows Stored XSS.This issue affects WP Business Hours: from n/a through <= 1.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-62934 is a vulnerability identified in the Mejar WP Business Hours plugin for WordPress, affecting versions up to 1.4. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF flaw facilitates Stored Cross-Site Scripting (XSS), where malicious scripts are injected and stored within the plugin's data, potentially affecting all users who view the compromised content. The vulnerability arises due to insufficient verification of the origin of requests, allowing attackers to craft malicious web pages that, when visited by an authenticated user, execute unauthorized commands on the vulnerable WordPress site. Stored XSS can lead to session hijacking, defacement, or redirection to malicious sites, severely impacting site integrity and user trust. Although no public exploits have been reported yet, the presence of stored XSS elevates the risk profile. The vulnerability affects a widely used plugin that manages business hours display, often installed on small and medium business websites. No CVSS score has been assigned, and no official patches are currently linked, indicating the need for immediate attention from site administrators. The vulnerability was published on October 27, 2025, with the assigner noted as Patchstack.
Potential Impact
For European organizations, especially SMEs relying on WordPress and the WP Business Hours plugin, this vulnerability poses significant risks. Exploitation could lead to unauthorized changes in plugin data, persistent XSS attacks compromising site visitors and administrators, and potential session hijacking. This undermines confidentiality by exposing user sessions and data, integrity by allowing unauthorized content injection, and availability if attackers disrupt site functionality. The impact is heightened in sectors where business hours and customer interaction are critical, such as retail, hospitality, and professional services. Additionally, compromised sites can be used as vectors for broader attacks or phishing campaigns targeting European users. The lack of authentication bypass means attackers must lure authenticated users to malicious sites, but given the common use of WordPress admin accounts, this is a realistic threat. The absence of known exploits provides a window for mitigation but should not lead to complacency.
Mitigation Recommendations
1. Immediately monitor for updates or patches released by Mejar for WP Business Hours and apply them promptly. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns targeting the plugin. 3. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS by restricting script execution sources. 4. Limit administrative access to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking. 5. Regularly audit and sanitize plugin data inputs and outputs to detect and remove malicious scripts. 6. Educate users and administrators about phishing and social engineering tactics that could trigger CSRF attacks. 7. Consider temporarily disabling the WP Business Hours plugin if immediate patching is not possible and business operations allow. 8. Employ security plugins that provide CSRF token validation and XSS protection for WordPress environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:24:41.997Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed03223a7bbed324acc05
Added to database: 10/27/2025, 1:51:46 AM
Last enriched: 10/27/2025, 2:26:40 AM
Last updated: 10/29/2025, 6:41:55 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9544: CWE-862 Missing Authorization in Doppler Forms
UnknownCVE-2025-49042: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Automattic WooCommerce
MediumCVE-2025-62776: Uncontrolled Search Path Element in Wireless Tsukamoto Co., Ltd. WTW EAGLE (for Windows)
HighCVE-2025-11705: CWE-862 Missing Authorization in scheeeli Anti-Malware Security and Brute-Force Firewall
MediumCVE-2025-64296: CWE-862 Missing Authorization in Facebook Facebook for WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.