CVE-2025-7685: CWE-352 Cross-Site Request Forgery (CSRF) in sflack Like & Share My Site
The Like & Share My Site plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing or incorrect nonce validation on the 'lsms_admin' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-7685 affects the 'Like & Share My Site' WordPress plugin developed by sflack, specifically all versions up to and including 0.2. It is a Cross-Site Request Forgery (CSRF) issue categorized under CWE-352, caused by missing or incorrect nonce validation on the plugin's 'lsms_admin' page. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent unauthorized actions. Due to the absence or improper implementation of nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), results in unauthorized changes to plugin settings or injection of malicious web scripts. This can compromise the confidentiality and integrity of the affected site by allowing attackers to alter configurations or embed harmful code that could be used for further attacks such as cross-site scripting (XSS) or privilege escalation. The vulnerability does not require prior authentication but does require user interaction from an administrator, which limits the attack vector but still poses a significant risk. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but user interaction necessary, and a scope change due to potential impact beyond the vulnerable component. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date July 22, 2025.
Potential Impact
The primary impact of CVE-2025-7685 is unauthorized modification of plugin settings and injection of malicious scripts into WordPress sites using the vulnerable plugin. This can lead to compromised site integrity, potential data leakage, and the possibility of further exploitation such as persistent cross-site scripting or administrative takeover. Organizations relying on this plugin risk having their websites manipulated without their consent, which can damage reputation, lead to data breaches, or facilitate malware distribution. Since the attack requires an administrator to be tricked into clicking a malicious link, social engineering is a key component, increasing the risk in environments with less security awareness. The vulnerability does not directly affect availability but can indirectly cause service disruption if malicious scripts degrade site functionality or trigger security defenses. Given WordPress's widespread use globally, any organization using this plugin is at risk, particularly those with high-value or sensitive web assets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if they are using the 'Like & Share My Site' plugin version 0.2 or earlier and disable or remove the plugin if possible until a patch is released. If disabling is not feasible, restrict administrative access to trusted users and implement strict network controls to limit exposure. Educate administrators about the risks of clicking unsolicited links and encourage the use of multi-factor authentication to reduce the impact of compromised credentials. Monitor web server and application logs for unusual requests targeting the 'lsms_admin' page. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting this plugin. Developers and site owners should follow up with the vendor for patches or updates that properly implement nonce validation. Additionally, consider implementing Content Security Policy (CSP) headers to mitigate the impact of injected scripts. Regular security audits and plugin inventory reviews can help identify and remediate similar risks proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-7685: CWE-352 Cross-Site Request Forgery (CSRF) in sflack Like & Share My Site
Description
The Like & Share My Site plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing or incorrect nonce validation on the 'lsms_admin' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-7685 affects the 'Like & Share My Site' WordPress plugin developed by sflack, specifically all versions up to and including 0.2. It is a Cross-Site Request Forgery (CSRF) issue categorized under CWE-352, caused by missing or incorrect nonce validation on the plugin's 'lsms_admin' page. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent unauthorized actions. Due to the absence or improper implementation of nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), results in unauthorized changes to plugin settings or injection of malicious web scripts. This can compromise the confidentiality and integrity of the affected site by allowing attackers to alter configurations or embed harmful code that could be used for further attacks such as cross-site scripting (XSS) or privilege escalation. The vulnerability does not require prior authentication but does require user interaction from an administrator, which limits the attack vector but still poses a significant risk. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but user interaction necessary, and a scope change due to potential impact beyond the vulnerable component. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date July 22, 2025.
Potential Impact
The primary impact of CVE-2025-7685 is unauthorized modification of plugin settings and injection of malicious scripts into WordPress sites using the vulnerable plugin. This can lead to compromised site integrity, potential data leakage, and the possibility of further exploitation such as persistent cross-site scripting or administrative takeover. Organizations relying on this plugin risk having their websites manipulated without their consent, which can damage reputation, lead to data breaches, or facilitate malware distribution. Since the attack requires an administrator to be tricked into clicking a malicious link, social engineering is a key component, increasing the risk in environments with less security awareness. The vulnerability does not directly affect availability but can indirectly cause service disruption if malicious scripts degrade site functionality or trigger security defenses. Given WordPress's widespread use globally, any organization using this plugin is at risk, particularly those with high-value or sensitive web assets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately verify if they are using the 'Like & Share My Site' plugin version 0.2 or earlier and disable or remove the plugin if possible until a patch is released. If disabling is not feasible, restrict administrative access to trusted users and implement strict network controls to limit exposure. Educate administrators about the risks of clicking unsolicited links and encourage the use of multi-factor authentication to reduce the impact of compromised credentials. Monitor web server and application logs for unusual requests targeting the 'lsms_admin' page. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting this plugin. Developers and site owners should follow up with the vendor for patches or updates that properly implement nonce validation. Additionally, consider implementing Content Security Policy (CSP) headers to mitigate the impact of injected scripts. Regular security audits and plugin inventory reviews can help identify and remediate similar risks proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-15T18:51:34.532Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687f5a59a83201eaac1a3a7f
Added to database: 7/22/2025, 9:31:05 AM
Last enriched: 2/26/2026, 4:28:02 PM
Last updated: 3/24/2026, 5:42:58 PM
Views: 486
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.