Skip to main content

CVE-2025-9617: CWE-352 Cross-Site Request Forgery (CSRF) in evidentlycube Publish approval

Medium
VulnerabilityCVE-2025-9617cvecve-2025-9617cwe-352
Published: Thu Sep 11 2025 (09/11/2025, 07:25:00 UTC)
Source: CVE Database V5
Vendor/Project: evidentlycube
Product: Publish approval

Description

The Publish approval plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the publish_save_option function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 09/11/2025, 07:33:42 UTC

Technical Analysis

CVE-2025-9617 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Publish approval plugin developed by evidentlycube for WordPress. This vulnerability exists in all versions up to and including 1.1 due to missing or incorrect nonce validation in the publish_save_option function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft malicious requests that, when executed by an authenticated site administrator (for example, by clicking a specially crafted link), can modify plugin settings without the administrator's consent. This type of attack exploits the trust a web application places in the user's browser and session, enabling unauthorized changes to plugin configurations. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) highlights that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts the integrity of the plugin settings but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. This vulnerability falls under CWE-352, a common web security weakness related to CSRF attacks.

Potential Impact

For European organizations using WordPress sites with the Publish approval plugin, this vulnerability poses a risk primarily to the integrity of plugin settings. An attacker could manipulate plugin configurations, potentially altering how content publishing approvals are handled, which might lead to unauthorized content being published or legitimate content being blocked or delayed. While this does not directly compromise user data confidentiality or site availability, it can undermine trust in content management workflows and potentially facilitate further attacks if malicious configurations are introduced. Organizations relying on this plugin for content approval workflows, especially those in sectors with strict content governance such as media, government, or regulated industries, may face operational disruptions or reputational damage. Since exploitation requires tricking an administrator into performing an action (such as clicking a link), the threat is somewhat mitigated by user awareness but remains significant given the lack of authentication requirements for the attacker. The medium CVSS score reflects this balance of impact and exploitability.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should verify if the Publish approval plugin is installed and identify the version in use. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting access to the plugin settings page to trusted IP addresses or VPN users only. Implementing Web Application Firewall (WAF) rules that detect and block suspicious CSRF attempts targeting the publish_save_option function can provide additional protection. Administrators should also be trained to recognize phishing attempts or suspicious links that could trigger CSRF attacks. Monitoring logs for unusual changes in plugin settings can help detect exploitation attempts early. Once a patch or update is available from evidentlycube, organizations must prioritize applying it promptly. Additionally, adopting security best practices such as enforcing multi-factor authentication for admin accounts and limiting the number of users with administrative privileges can reduce the risk of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T18:26:40.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a22e1c560fa9d94d4a1

Added to database: 9/11/2025, 7:28:34 AM

Last enriched: 9/11/2025, 7:33:42 AM

Last updated: 9/11/2025, 7:33:42 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats