CVE-2025-64357: Cross-Site Request Forgery (CSRF) in Younes JFR. Advanced Database Cleaner
Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner advanced-database-cleaner allows Cross Site Request Forgery.This issue affects Advanced Database Cleaner: from n/a through <= 3.1.6.
AI Analysis
Technical Summary
CVE-2025-64357 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Advanced Database Cleaner plugin developed by Younes JFR, affecting versions up to 3.1.6. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application where they are authenticated. In this case, the vulnerability allows an attacker with low privileges to induce the plugin to perform database cleaning operations without the user's consent. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low attack complexity and requires low privileges but no user interaction. The impact is limited to confidentiality, possibly exposing sensitive data or metadata related to database cleaning processes, but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches are linked yet, implying that users should monitor for updates. The plugin is commonly used in WordPress environments to optimize and clean databases by removing unnecessary data, which makes it a target for attackers aiming to manipulate or gather information about database maintenance activities. The lack of CSRF protections such as anti-CSRF tokens or proper validation of request origins is the root cause of this vulnerability.
Potential Impact
For European organizations, especially those relying on WordPress or similar CMS platforms with the Advanced Database Cleaner plugin installed, this vulnerability could lead to unauthorized database cleaning operations initiated by attackers. While the impact on integrity and availability is minimal, the confidentiality impact could expose sensitive configuration or operational data related to database maintenance. This could aid attackers in further reconnaissance or targeted attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if sensitive data is exposed. Additionally, SMEs and digital service providers using this plugin are at risk of indirect impacts, such as service disruptions or reputational damage if attackers leverage this vulnerability as part of a broader attack chain. The medium severity rating suggests that while the risk is not critical, it should not be ignored, especially in environments where database integrity and confidentiality are paramount.
Mitigation Recommendations
To mitigate CVE-2025-64357, organizations should: 1) Monitor for and apply official patches or updates from Younes JFR as soon as they are released to address the CSRF vulnerability. 2) Implement web application firewall (WAF) rules that detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 3) Restrict access to the plugin’s administrative functions to trusted IP addresses or VPNs to reduce exposure. 4) Enforce least privilege principles by limiting user roles that can access or execute database cleaning operations within the CMS. 5) If possible, manually verify or add CSRF tokens to plugin requests to ensure that only legitimate requests are processed. 6) Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and CSRF protections. 7) Educate administrators and users about the risks of CSRF and encourage cautious behavior when interacting with administrative interfaces. 8) Consider alternative plugins with better security track records if timely patches are not available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-64357: Cross-Site Request Forgery (CSRF) in Younes JFR. Advanced Database Cleaner
Description
Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner advanced-database-cleaner allows Cross Site Request Forgery.This issue affects Advanced Database Cleaner: from n/a through <= 3.1.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-64357 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Advanced Database Cleaner plugin developed by Younes JFR, affecting versions up to 3.1.6. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application where they are authenticated. In this case, the vulnerability allows an attacker with low privileges to induce the plugin to perform database cleaning operations without the user's consent. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low attack complexity and requires low privileges but no user interaction. The impact is limited to confidentiality, possibly exposing sensitive data or metadata related to database cleaning processes, but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches are linked yet, implying that users should monitor for updates. The plugin is commonly used in WordPress environments to optimize and clean databases by removing unnecessary data, which makes it a target for attackers aiming to manipulate or gather information about database maintenance activities. The lack of CSRF protections such as anti-CSRF tokens or proper validation of request origins is the root cause of this vulnerability.
Potential Impact
For European organizations, especially those relying on WordPress or similar CMS platforms with the Advanced Database Cleaner plugin installed, this vulnerability could lead to unauthorized database cleaning operations initiated by attackers. While the impact on integrity and availability is minimal, the confidentiality impact could expose sensitive configuration or operational data related to database maintenance. This could aid attackers in further reconnaissance or targeted attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if sensitive data is exposed. Additionally, SMEs and digital service providers using this plugin are at risk of indirect impacts, such as service disruptions or reputational damage if attackers leverage this vulnerability as part of a broader attack chain. The medium severity rating suggests that while the risk is not critical, it should not be ignored, especially in environments where database integrity and confidentiality are paramount.
Mitigation Recommendations
To mitigate CVE-2025-64357, organizations should: 1) Monitor for and apply official patches or updates from Younes JFR as soon as they are released to address the CSRF vulnerability. 2) Implement web application firewall (WAF) rules that detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 3) Restrict access to the plugin’s administrative functions to trusted IP addresses or VPNs to reduce exposure. 4) Enforce least privilege principles by limiting user roles that can access or execute database cleaning operations within the CMS. 5) If possible, manually verify or add CSRF tokens to plugin requests to ensure that only legitimate requests are processed. 6) Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and CSRF protections. 7) Educate administrators and users about the risks of CSRF and encourage cautious behavior when interacting with administrative interfaces. 8) Consider alternative plugins with better security track records if timely patches are not available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-31T11:23:06.889Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6904a34e479ed964d8ea1e9a
Added to database: 10/31/2025, 11:53:50 AM
Last enriched: 1/21/2026, 12:03:34 AM
Last updated: 2/7/2026, 8:45:52 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.