Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68885: CWE-352 Cross-Site Request Forgery (CSRF) in Page Carbajal Custom Post Status

0
High
VulnerabilityCVE-2025-68885cvecve-2025-68885cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 05:34:27 UTC)
Source: CVE Database V5
Vendor/Project: Page Carbajal
Product: Custom Post Status

Description

CVE-2025-68885 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability in the Page Carbajal Custom Post Status plugin, affecting versions up to 1. 1. 0. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user, potentially leading to stored Cross-Site Scripting (XSS) attacks. Exploitation requires user interaction but no prior authentication, and can impact confidentiality, integrity, and availability of affected systems. No known exploits are currently in the wild, and no patches have been published yet. European organizations using this plugin, especially those relying on WordPress or similar CMS platforms, are at risk. Mitigation involves implementing CSRF tokens, validating user input, and restricting permissions. Countries with high WordPress usage and significant digital infrastructure, such as Germany, France, and the UK, are most likely to be affected. The vulnerability has a CVSS score of 7.

AI-Powered Analysis

AILast updated: 01/07/2026, 13:02:44 UTC

Technical Analysis

CVE-2025-68885 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Page Carbajal Custom Post Status plugin, which is used to manage custom post statuses in content management systems, likely WordPress. The vulnerability exists because the plugin fails to properly validate requests to change post statuses, allowing attackers to craft malicious requests that, when executed by an authenticated user, can perform unauthorized actions. This CSRF flaw can be chained with stored Cross-Site Scripting (XSS) attacks, where malicious scripts are injected and persist within the application, potentially compromising user sessions, stealing cookies, or executing arbitrary code in the victim’s browser. The vulnerability affects all versions up to 1.1.0, with no patches currently available. The CVSS 3.1 score of 7.1 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), with a scope change (S:C) and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). This means an attacker can exploit the vulnerability remotely without credentials but needs the user to interact with a malicious link or page. The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, increasing its impact. Although no known exploits are reported in the wild, the combination of CSRF and stored XSS makes this a significant threat, especially for websites relying on this plugin for content management. The lack of patch links suggests that vendors or maintainers have not yet released a fix, increasing the urgency for organizations to apply mitigations or workarounds.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites and web applications using the Page Carbajal Custom Post Status plugin. Successful exploitation can lead to unauthorized actions performed under the guise of legitimate users, including content manipulation, privilege escalation, or injection of malicious scripts that compromise user data and session integrity. This can result in data breaches, defacement, loss of user trust, and potential regulatory non-compliance under GDPR due to unauthorized data access or manipulation. The stored XSS component can facilitate broader attacks such as credential theft, malware distribution, or lateral movement within networks. Given the widespread use of WordPress and similar CMS platforms in Europe, organizations in sectors like e-commerce, media, government, and education are particularly vulnerable. The impact extends to availability if attackers disrupt content management workflows or inject scripts that degrade site performance or functionality. The high CVSS score underscores the need for urgent attention to prevent exploitation that could have cascading effects on confidentiality, integrity, and availability of critical web assets.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for updates or patches from the Page Carbajal plugin maintainers and apply them immediately upon release. In the absence of official patches, implement strict CSRF protections by ensuring that all state-changing requests require valid, unique CSRF tokens verified server-side. Review and harden user input validation and sanitization mechanisms to prevent stored XSS payloads from being injected or executed. Restrict plugin usage to trusted administrators and limit permissions to the minimum necessary to reduce attack surface. Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF and XSS attack patterns. Conduct regular security audits and penetration testing focused on CMS plugins and extensions. Educate users about phishing and social engineering risks to reduce the likelihood of successful user interaction exploitation. Finally, consider disabling or replacing the vulnerable plugin with a more secure alternative if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-24T14:00:37.597Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6954b81adb813ff03ec990c3

Added to database: 12/31/2025, 5:43:54 AM

Last enriched: 1/7/2026, 1:02:44 PM

Last updated: 1/8/2026, 7:21:27 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats