Skip to main content

CVE-2025-7839: CWE-352 Cross-Site Request Forgery (CSRF) in pokornydavid Restore Permanently delete Post or Page Data

Medium
VulnerabilityCVE-2025-7839cvecve-2025-7839cwe-352
Published: Sat Aug 23 2025 (08/23/2025, 04:25:47 UTC)
Source: CVE Database V5
Vendor/Project: pokornydavid
Product: Restore Permanently delete Post or Page Data

Description

The Restore Permanently delete Post or Page Data plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the rp_dpo_dpa_ajax_dp_delete_data() function. This makes it possible for unauthenticated attackers to delete data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/31/2025, 01:09:53 UTC

Technical Analysis

CVE-2025-7839 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin "Restore Permanently delete Post or Page Data" developed by pokornydavid. This vulnerability affects all versions up to and including 1.0 of the plugin. The root cause is the absence or incorrect implementation of nonce validation in the function rp_dpo_dpa_ajax_dp_delete_data(). Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source and to prevent unauthorized actions. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), triggers the deletion of post or page data permanently. The vulnerability does not require the attacker to be authenticated but does require user interaction from an administrator, such as clicking a link or visiting a malicious page. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact is limited to integrity loss (unauthorized deletion of data) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks.

Potential Impact

For European organizations using WordPress websites with the affected plugin installed, this vulnerability poses a risk of unauthorized deletion of critical post or page content. Although the attack requires tricking an administrator into performing an action, successful exploitation could lead to data loss, content disruption, and potential reputational damage. This could affect public-facing websites, intranet portals, or content management systems that rely on this plugin for data restoration or deletion functionalities. The impact is primarily on data integrity, potentially causing operational disruptions if important content is deleted and not recoverable. Since the vulnerability does not affect confidentiality or availability directly, the risk is more about content tampering and administrative overhead to restore lost data. European organizations with strict data governance and compliance requirements may face additional scrutiny if data loss incidents occur due to such vulnerabilities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their WordPress installations for the presence of the "Restore Permanently delete Post or Page Data" plugin. If found, they should disable or remove the plugin until a security patch is released by the vendor. Administrators should be educated about the risks of clicking on unsolicited links or performing actions without verifying the source, especially in administrative contexts. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin's AJAX endpoints can provide an additional layer of defense. Organizations should also enforce multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of compromised credentials being exploited in conjunction with CSRF. Monitoring and logging administrative actions related to post/page deletion can help detect suspicious activity early. Finally, organizations should subscribe to vulnerability advisories and promptly apply patches once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T19:35:43.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a9446fad5a09ad0026953b

Added to database: 8/23/2025, 4:32:47 AM

Last enriched: 8/31/2025, 1:09:53 AM

Last updated: 9/1/2025, 12:34:20 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats