Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62934: Cross-Site Request Forgery (CSRF) in Mejar WP Business Hours

0
High
VulnerabilityCVE-2025-62934cvecve-2025-62934
Published: Mon Oct 27 2025 (10/27/2025, 01:34:02 UTC)
Source: CVE Database V5
Vendor/Project: Mejar
Product: WP Business Hours

Description

Cross-Site Request Forgery (CSRF) vulnerability in Mejar WP Business Hours wp-business-hours allows Stored XSS.This issue affects WP Business Hours: from n/a through <= 1.4.

AI-Powered Analysis

AILast updated: 10/27/2025, 02:26:40 UTC

Technical Analysis

CVE-2025-62934 is a vulnerability identified in the Mejar WP Business Hours plugin for WordPress, affecting versions up to 1.4. The core issue is a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF flaw facilitates Stored Cross-Site Scripting (XSS), where malicious scripts are injected and stored within the plugin's data, potentially affecting all users who view the compromised content. The vulnerability arises due to insufficient verification of the origin of requests, allowing attackers to craft malicious web pages that, when visited by an authenticated user, execute unauthorized commands on the vulnerable WordPress site. Stored XSS can lead to session hijacking, defacement, or redirection to malicious sites, severely impacting site integrity and user trust. Although no public exploits have been reported yet, the presence of stored XSS elevates the risk profile. The vulnerability affects a widely used plugin that manages business hours display, often installed on small and medium business websites. No CVSS score has been assigned, and no official patches are currently linked, indicating the need for immediate attention from site administrators. The vulnerability was published on October 27, 2025, with the assigner noted as Patchstack.

Potential Impact

For European organizations, especially SMEs relying on WordPress and the WP Business Hours plugin, this vulnerability poses significant risks. Exploitation could lead to unauthorized changes in plugin data, persistent XSS attacks compromising site visitors and administrators, and potential session hijacking. This undermines confidentiality by exposing user sessions and data, integrity by allowing unauthorized content injection, and availability if attackers disrupt site functionality. The impact is heightened in sectors where business hours and customer interaction are critical, such as retail, hospitality, and professional services. Additionally, compromised sites can be used as vectors for broader attacks or phishing campaigns targeting European users. The lack of authentication bypass means attackers must lure authenticated users to malicious sites, but given the common use of WordPress admin accounts, this is a realistic threat. The absence of known exploits provides a window for mitigation but should not lead to complacency.

Mitigation Recommendations

1. Immediately monitor for updates or patches released by Mejar for WP Business Hours and apply them promptly. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns targeting the plugin. 3. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS by restricting script execution sources. 4. Limit administrative access to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking. 5. Regularly audit and sanitize plugin data inputs and outputs to detect and remove malicious scripts. 6. Educate users and administrators about phishing and social engineering tactics that could trigger CSRF attacks. 7. Consider temporarily disabling the WP Business Hours plugin if immediate patching is not possible and business operations allow. 8. Employ security plugins that provide CSRF token validation and XSS protection for WordPress environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:41.997Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed03223a7bbed324acc05

Added to database: 10/27/2025, 1:51:46 AM

Last enriched: 10/27/2025, 2:26:40 AM

Last updated: 10/29/2025, 6:41:55 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats