Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67593: Cross-Site Request Forgery (CSRF) in Stiofan UsersWP

0
Medium
VulnerabilityCVE-2025-67593cvecve-2025-67593
Published: Tue Dec 09 2025 (12/09/2025, 14:14:17 UTC)
Source: CVE Database V5
Vendor/Project: Stiofan
Product: UsersWP

Description

Cross-Site Request Forgery (CSRF) vulnerability in Stiofan UsersWP userswp allows Cross Site Request Forgery.This issue affects UsersWP: from n/a through <= 1.2.48.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:06:45 UTC

Technical Analysis

CVE-2025-67593 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the UsersWP plugin developed by Stiofan, affecting all versions up to 1.2.48. CSRF vulnerabilities occur when a web application does not adequately verify that requests to perform state-changing actions originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly execute unwanted actions. In this case, the UsersWP plugin lacks sufficient CSRF protections, enabling remote attackers to exploit this flaw by enticing logged-in users to visit a malicious site or click a crafted link. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network without prior privileges, requires low attack complexity, and necessitates user interaction. The impact is limited to a minor confidentiality breach, with no effect on data integrity or system availability. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed promptly. UsersWP is a WordPress plugin used to manage user profiles and memberships, commonly deployed in community, membership, or social networking sites. The absence of patches at the time of disclosure suggests that users must implement interim mitigations until official updates are released.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized actions performed on their WordPress sites by authenticated users without their consent, potentially exposing limited confidential information or causing minor disruptions in user profile management. While the impact is not critical, it could facilitate further social engineering or phishing attacks by undermining user trust and site integrity. Organizations operating membership or community platforms using UsersWP are particularly at risk. The vulnerability does not compromise data integrity or availability directly but could be leveraged as part of a broader attack chain. Given the widespread use of WordPress and the popularity of user management plugins in Europe, the threat could affect a significant number of websites, especially in countries with high WordPress market share. The medium severity rating reflects the moderate risk level, emphasizing the need for timely mitigation to prevent exploitation.

Mitigation Recommendations

1. Monitor official Stiofan and UsersWP channels for security patches addressing CVE-2025-67593 and apply updates immediately upon release. 2. Implement web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting UsersWP endpoints. 3. Enforce the use of anti-CSRF tokens in all forms and state-changing requests within the WordPress environment, either via plugin updates or custom code if feasible. 4. Educate users and administrators about the risks of clicking untrusted links while authenticated on the site to reduce the likelihood of successful CSRF attacks. 5. Restrict sensitive actions to users with appropriate roles and consider additional verification steps (e.g., CAPTCHA, two-factor authentication) for critical operations. 6. Conduct regular security audits of WordPress plugins and configurations to identify and remediate similar vulnerabilities proactively. 7. Where patching is delayed, consider temporarily disabling or limiting the functionality of the UsersWP plugin to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:39.681Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ae29cea75c35ae5770

Added to database: 12/9/2025, 2:35:26 PM

Last enriched: 1/21/2026, 1:06:45 AM

Last updated: 2/7/2026, 6:09:19 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats