CVE-2025-7812: CWE-352 Cross-Site Request Forgery (CSRF) in videowhisper Video Share VOD – Turnkey Video Site Builder Script
The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.6. This is due to missing or incorrect nonce validation on the adminExport() function. This makes it possible for unauthenticated attackers to update settings and execute remote code when the Server command execution setting is enabled via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress suffers from a critical Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-7812. This vulnerability exists in all versions up to and including 2.7.6 due to missing or incorrect nonce validation in the adminExport() function. Nonces are security tokens used to verify that requests are legitimate and initiated by authorized users. The absence of proper nonce validation allows attackers to craft malicious requests that, when executed by an authenticated administrator, can update plugin settings. Crucially, if the plugin's Server command execution setting is enabled, these forged requests can lead to remote code execution (RCE) on the hosting server, enabling attackers to run arbitrary commands. The attack vector requires no prior authentication but does require user interaction, specifically the administrator being tricked into clicking a malicious link or visiting a crafted webpage. The vulnerability has a CVSS v3.1 base score of 8.8, indicating a high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the potential for severe damage including full server compromise makes this a critical issue for affected sites. The vulnerability was publicly disclosed on August 28, 2025, and no official patches have been linked yet, emphasizing the need for immediate mitigation.
Potential Impact
The impact of CVE-2025-7812 is significant for organizations using the vulnerable Video Share VOD plugin. Successful exploitation can lead to unauthorized modification of plugin settings and remote code execution on the web server, potentially resulting in full system compromise. This can lead to data breaches, defacement, service disruption, or the server being used as a foothold for further attacks within the network. Since the vulnerability requires only that an administrator be tricked into clicking a link, social engineering can facilitate exploitation even without direct access. The compromise of administrator privileges can undermine the entire WordPress site security, affecting confidentiality, integrity, and availability of hosted content and user data. Organizations relying on this plugin for video content delivery or site building face risks of operational disruption and reputational damage. The lack of known exploits in the wild currently may limit immediate widespread attacks, but the high severity and ease of exploitation make it a critical threat to address promptly.
Mitigation Recommendations
To mitigate CVE-2025-7812, organizations should immediately audit their WordPress sites for the presence of the Video Share VOD plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, administrators should ensure the Server command execution setting is disabled to prevent remote code execution. Implement strict administrative access controls and educate administrators about the risks of clicking unsolicited links or visiting untrusted websites. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the adminExport() function. Monitor logs for unusual administrative actions or unexpected changes in plugin settings. Once a patch becomes available, apply it immediately. Additionally, consider implementing multi-factor authentication (MFA) for administrator accounts to reduce the risk of unauthorized actions. Regularly back up site data and configurations to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-7812: CWE-352 Cross-Site Request Forgery (CSRF) in videowhisper Video Share VOD – Turnkey Video Site Builder Script
Description
The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.6. This is due to missing or incorrect nonce validation on the adminExport() function. This makes it possible for unauthenticated attackers to update settings and execute remote code when the Server command execution setting is enabled via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress suffers from a critical Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-7812. This vulnerability exists in all versions up to and including 2.7.6 due to missing or incorrect nonce validation in the adminExport() function. Nonces are security tokens used to verify that requests are legitimate and initiated by authorized users. The absence of proper nonce validation allows attackers to craft malicious requests that, when executed by an authenticated administrator, can update plugin settings. Crucially, if the plugin's Server command execution setting is enabled, these forged requests can lead to remote code execution (RCE) on the hosting server, enabling attackers to run arbitrary commands. The attack vector requires no prior authentication but does require user interaction, specifically the administrator being tricked into clicking a malicious link or visiting a crafted webpage. The vulnerability has a CVSS v3.1 base score of 8.8, indicating a high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the potential for severe damage including full server compromise makes this a critical issue for affected sites. The vulnerability was publicly disclosed on August 28, 2025, and no official patches have been linked yet, emphasizing the need for immediate mitigation.
Potential Impact
The impact of CVE-2025-7812 is significant for organizations using the vulnerable Video Share VOD plugin. Successful exploitation can lead to unauthorized modification of plugin settings and remote code execution on the web server, potentially resulting in full system compromise. This can lead to data breaches, defacement, service disruption, or the server being used as a foothold for further attacks within the network. Since the vulnerability requires only that an administrator be tricked into clicking a link, social engineering can facilitate exploitation even without direct access. The compromise of administrator privileges can undermine the entire WordPress site security, affecting confidentiality, integrity, and availability of hosted content and user data. Organizations relying on this plugin for video content delivery or site building face risks of operational disruption and reputational damage. The lack of known exploits in the wild currently may limit immediate widespread attacks, but the high severity and ease of exploitation make it a critical threat to address promptly.
Mitigation Recommendations
To mitigate CVE-2025-7812, organizations should immediately audit their WordPress sites for the presence of the Video Share VOD plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, administrators should ensure the Server command execution setting is disabled to prevent remote code execution. Implement strict administrative access controls and educate administrators about the risks of clicking unsolicited links or visiting untrusted websites. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the adminExport() function. Monitor logs for unusual administrative actions or unexpected changes in plugin settings. Once a patch becomes available, apply it immediately. Additionally, consider implementing multi-factor authentication (MFA) for administrator accounts to reduce the risk of unauthorized actions. Regularly back up site data and configurations to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T15:29:07.315Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68afbc4cad5a09ad00682525
Added to database: 8/28/2025, 2:17:48 AM
Last enriched: 2/26/2026, 4:37:49 PM
Last updated: 3/25/2026, 1:32:12 AM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.