Skip to main content

CVE-2025-8103: CWE-352 Cross-Site Request Forgery (CSRF) in etruel WPeMatico RSS Feed Fetcher

Medium
VulnerabilityCVE-2025-8103cvecve-2025-8103cwe-352
Published: Sat Jul 26 2025 (07/26/2025, 03:38:18 UTC)
Source: CVE Database V5
Vendor/Project: etruel
Product: WPeMatico RSS Feed Fetcher

Description

The WPeMatico RSS Feed Fetcher plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.7. This is due to missing nonce validation in the handle_feedback_submission() function. This makes it possible for unauthenticated attackers to deactivate the plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/03/2025, 00:57:14 UTC

Technical Analysis

CVE-2025-8103 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPeMatico RSS Feed Fetcher plugin for WordPress, affecting all versions up to and including 2.8.7. The vulnerability arises from the absence of nonce validation in the handle_feedback_submission() function, which is responsible for processing certain plugin actions. Nonce validation is a security measure used to ensure that requests to perform sensitive actions originate from legitimate users and not from malicious third-party sites. Without this protection, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), causes the plugin to be deactivated without the administrator's consent or knowledge. This attack vector does not require the attacker to be authenticated on the target site, relying instead on social engineering to trick an administrator into initiating the request. The vulnerability impacts the availability of the plugin by allowing attackers to disable it, potentially disrupting the automated RSS feed fetching functionality that WPeMatico provides. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack can be performed remotely without privileges but requires user interaction and results in a limited impact on availability only, with no direct confidentiality or integrity compromise. No known exploits are currently reported in the wild, and no patches or updates have been linked yet, indicating that mitigation may require manual intervention or monitoring for future updates from the vendor etruel. This vulnerability is categorized under CWE-352, which specifically addresses CSRF weaknesses in web applications.

Potential Impact

For European organizations using WordPress sites with the WPeMatico RSS Feed Fetcher plugin, this vulnerability could lead to unexpected deactivation of the plugin, disrupting content aggregation and automated feed updates. This may affect websites that rely on timely RSS feed content for news, marketing, or operational purposes, potentially degrading user experience or causing information delays. While the vulnerability does not directly expose sensitive data or allow code execution, the loss of plugin functionality could indirectly impact business continuity, especially for media outlets, e-commerce sites, or corporate blogs that depend on automated content feeds. Additionally, if attackers combine this CSRF attack with other vulnerabilities or social engineering tactics, it could be part of a broader campaign to destabilize web presence or distract administrators during more severe attacks. The requirement for administrator interaction limits the scope but does not eliminate risk, particularly in environments where administrators may be targeted via phishing or malicious links. Given the widespread use of WordPress across Europe, even a medium-severity vulnerability like this warrants attention to maintain operational stability and trust in web services.

Mitigation Recommendations

To mitigate CVE-2025-8103, European organizations should first verify if their WordPress installations use the WPeMatico RSS Feed Fetcher plugin and identify the version in use. Until an official patch is released, administrators should consider temporarily disabling the plugin if it is not critical or restricting administrative access to trusted networks and users to reduce exposure. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help reduce the risk of CSRF attacks by limiting cross-origin requests. Administrators should also be trained to recognize phishing attempts and avoid clicking on suspicious links, especially when logged into WordPress admin panels. Monitoring web server logs for unusual POST requests targeting the plugin’s feedback submission endpoint can provide early detection of exploitation attempts. Once a patch or update is available from etruel, prompt application of the update is essential. Additionally, employing web application firewalls (WAFs) with rules to detect and block CSRF patterns can provide an additional protective layer. Regular security audits and plugin reviews should be conducted to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-23T21:50:35.383Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68844fe2ad5a09ad005a5afa

Added to database: 7/26/2025, 3:47:46 AM

Last enriched: 8/3/2025, 12:57:14 AM

Last updated: 9/6/2025, 7:48:35 AM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats