Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9618: CWE-352 Cross-Site Request Forgery (CSRF) in wpdreams Related Posts Lite

0
Medium
VulnerabilityCVE-2025-9618cvecve-2025-9618cwe-352
Published: Sat Aug 30 2025 (08/30/2025, 01:45:53 UTC)
Source: CVE Database V5
Vendor/Project: wpdreams
Product: Related Posts Lite

Description

The Related Posts Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:04:34 UTC

Technical Analysis

CVE-2025-9618 is a medium severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) found in the Related Posts Lite WordPress plugin developed by wpdreams. This vulnerability affects all versions up to and including 1.12. The root cause is the absence or incorrect implementation of nonce validation on the settings update functionality within the plugin. Nonces in WordPress are security tokens used to verify that requests to change settings or perform sensitive actions originate from legitimate users and not from forged requests. Due to this missing protection, an unauthenticated attacker can craft a malicious URL or form that, when visited or submitted by an authenticated site administrator, causes the plugin settings to be modified without the administrator's consent. This attack requires user interaction, specifically that an administrator clicks on or otherwise triggers the malicious request. The impact is limited to integrity, as attackers can alter plugin configurations, potentially enabling further attacks or disrupting site behavior. Confidentiality and availability are not directly affected. The vulnerability has a CVSS v3.1 base score of 4.3, reflecting its moderate risk level. No public exploits or active exploitation campaigns have been reported as of the publication date. The vulnerability was reserved on August 28, 2025, and published on August 30, 2025. No official patches have been linked yet, so mitigation relies on administrative caution and potential plugin updates.

Potential Impact

The primary impact of CVE-2025-9618 is unauthorized modification of the Related Posts Lite plugin settings by attackers who can trick site administrators into performing actions on malicious links or pages. This can lead to configuration changes that may degrade website functionality, introduce security weaknesses, or enable further exploitation vectors such as redirecting users to malicious sites or disabling security features. Since the vulnerability does not affect confidentiality or availability directly, the risk is mainly to the integrity of the website's configuration. However, compromised plugin settings can indirectly facilitate broader attacks or site defacement. Organizations relying on this plugin for content management and user engagement may experience disruptions or reputational damage if exploited. The requirement for administrator interaction limits the ease of exploitation but does not eliminate risk, especially in environments where administrators may be targeted with phishing or social engineering. The absence of known exploits reduces immediate threat but vigilance is necessary given the widespread use of WordPress and its plugins globally.

Mitigation Recommendations

1. Immediately monitor for updates from the wpdreams development team and apply any released patches addressing this vulnerability. 2. Until an official patch is available, restrict administrator access to trusted personnel and educate them about the risks of clicking unknown or suspicious links. 3. Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s settings endpoints. 4. Use security plugins that enforce nonce validation or add additional CSRF protections as a temporary workaround. 5. Regularly audit plugin configurations and logs for unauthorized changes. 6. Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of compromised credentials being leveraged in conjunction with CSRF. 7. Limit the number of administrators and ensure they follow best security practices to minimize the attack surface. 8. Consider disabling or replacing the Related Posts Lite plugin with alternatives that have verified security controls if patching is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T18:28:44.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b25f4cad5a09ad007de32f

Added to database: 8/30/2025, 2:17:48 AM

Last enriched: 2/26/2026, 6:04:34 PM

Last updated: 3/26/2026, 6:49:49 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses