Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67622: Cross-Site Request Forgery (CSRF) in titopandub Evergreen Post Tweeter

0
High
VulnerabilityCVE-2025-67622cvecve-2025-67622
Published: Wed Dec 24 2025 (12/24/2025, 13:10:21 UTC)
Source: CVE Database V5
Vendor/Project: titopandub
Product: Evergreen Post Tweeter

Description

Cross-Site Request Forgery (CSRF) vulnerability in titopandub Evergreen Post Tweeter evergreen-post-tweeter allows Stored XSS.This issue affects Evergreen Post Tweeter: from n/a through <= 1.8.9.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:08:37 UTC

Technical Analysis

CVE-2025-67622 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Evergreen Post Tweeter plugin developed by titopandub, affecting all versions up to and including 1.8.9. The vulnerability allows an attacker to craft malicious requests that, when executed by an authenticated user, can perform unauthorized actions within the plugin's context. This CSRF flaw is compounded by the presence of stored Cross-Site Scripting (XSS), meaning that malicious scripts can be injected and persist within the application, potentially executing in the context of other users' browsers. The CVSS 3.1 base score of 8.8 indicates a high severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The impact covers confidentiality, integrity, and availability, allowing attackers to steal sensitive data, manipulate content, or disrupt service. Although no known exploits are currently in the wild, the vulnerability's nature makes it a significant risk for websites using this plugin for social media automation or content posting. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies. The vulnerability was reserved and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress and the Evergreen Post Tweeter plugin for automating social media posts or managing content. Exploitation could lead to unauthorized posting of malicious content, defacement, or injection of persistent XSS payloads that compromise user sessions and data confidentiality. This can damage organizational reputation, lead to data breaches involving customer or employee information, and disrupt business operations. Given the plugin’s role in social media automation, attackers might leverage this to spread misinformation or phishing links, amplifying the threat. The high severity and ease of exploitation without authentication increase the risk profile. Organizations in sectors such as media, marketing, e-commerce, and public services are particularly vulnerable due to their reliance on social media engagement. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exploitation could result in compliance violations and financial penalties.

Mitigation Recommendations

Immediate mitigation should focus on minimizing exposure until an official patch is released. Organizations should disable or uninstall the Evergreen Post Tweeter plugin if feasible. If the plugin is critical, restrict its usage to trusted administrators and implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting the plugin’s endpoints. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS. Review and harden user roles and permissions to limit the scope of potential exploitation. Implement multi-factor authentication (MFA) to reduce the risk of session hijacking. Monitor logs for unusual activity related to the plugin and conduct regular security assessments. Once a patch is available, prioritize immediate application. Additionally, educate users about phishing and social engineering risks that could facilitate CSRF attacks through user interaction.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T16:46:41.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694bea1c279c98bf57f751e8

Added to database: 12/24/2025, 1:26:52 PM

Last enriched: 1/21/2026, 1:08:37 AM

Last updated: 2/7/2026, 3:30:06 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats