CVE-2025-8481: CWE-352 Cross-Site Request Forgery (CSRF) in mdimran41 Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid
The Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.1.7. This is due to missing or incorrect nonce validation on the bdfe_install_activate_rswpbs_only function. This makes it possible for unauthenticated attackers to install the 'rs-wp-books-showcase' plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid plugin for WordPress version 1.1.7 contains a CSRF vulnerability (CWE-352) due to missing or incorrect nonce validation on the bdfe_install_activate_rswpbs_only function. This vulnerability enables unauthenticated attackers to install the 'rs-wp-books-showcase' plugin by leveraging a forged request that requires a site administrator to be tricked into clicking a link or performing an action. The CVSS 3.1 base score is 4.3, indicating medium severity, with attack vector network, low attack complexity, no privileges required, user interaction required, and limited impact on integrity only.
Potential Impact
An attacker can cause a site administrator to unknowingly install an additional plugin ('rs-wp-books-showcase') on the affected WordPress site. This could lead to unauthorized changes in the site's plugin configuration. The vulnerability does not directly impact confidentiality or availability, and no known active exploitation has been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, administrators should exercise caution with unsolicited links and avoid clicking on untrusted URLs while logged into the WordPress admin interface. Monitoring for updates from the plugin vendor or WordPress security advisories is recommended.
CVE-2025-8481: CWE-352 Cross-Site Request Forgery (CSRF) in mdimran41 Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid
Description
The Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.1.7. This is due to missing or incorrect nonce validation on the bdfe_install_activate_rswpbs_only function. This makes it possible for unauthenticated attackers to install the 'rs-wp-books-showcase' plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Blog Designer For Elementor – Post Slider, Post Carousel, Post Grid plugin for WordPress version 1.1.7 contains a CSRF vulnerability (CWE-352) due to missing or incorrect nonce validation on the bdfe_install_activate_rswpbs_only function. This vulnerability enables unauthenticated attackers to install the 'rs-wp-books-showcase' plugin by leveraging a forged request that requires a site administrator to be tricked into clicking a link or performing an action. The CVSS 3.1 base score is 4.3, indicating medium severity, with attack vector network, low attack complexity, no privileges required, user interaction required, and limited impact on integrity only.
Potential Impact
An attacker can cause a site administrator to unknowingly install an additional plugin ('rs-wp-books-showcase') on the affected WordPress site. This could lead to unauthorized changes in the site's plugin configuration. The vulnerability does not directly impact confidentiality or availability, and no known active exploitation has been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, administrators should exercise caution with unsolicited links and avoid clicking on untrusted URLs while logged into the WordPress admin interface. Monitoring for updates from the plugin vendor or WordPress security advisories is recommended.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-01T17:41:03.395Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a22e1c560fa9d94d45f
Added to database: 9/11/2025, 7:28:34 AM
Last enriched: 4/9/2026, 10:53:25 AM
Last updated: 5/9/2026, 11:04:54 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.