Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9625: CWE-352 Cross-Site Request Forgery (CSRF) in interledger Coil Web Monetization

0
Medium
VulnerabilityCVE-2025-9625cvecve-2025-9625cwe-352
Published: Tue Nov 18 2025 (11/18/2025, 08:27:31 UTC)
Source: CVE Database V5
Vendor/Project: interledger
Product: Coil Web Monetization

Description

The Coil Web Monetization plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on the coil-get-css-selector parameter handling in the maybe_restrict_content function. This makes it possible for unauthenticated attackers to trigger CSS selector detection functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 11/25/2025, 09:51:18 UTC

Technical Analysis

CVE-2025-9625 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Coil Web Monetization plugin for WordPress, affecting all versions up to and including 2.0.2. The vulnerability stems from improper or missing nonce validation on the coil-get-css-selector parameter within the maybe_restrict_content function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. In this case, the absence or incorrect implementation of nonce checks allows an attacker to craft a malicious request that can be sent to a vulnerable WordPress site. If a site administrator or user with sufficient privileges is tricked into clicking a specially crafted link, the attack can trigger the plugin's CSS selector detection functionality without their consent. Although the attack does not disclose sensitive information or disrupt service availability, it can lead to unauthorized actions being performed, compromising the integrity of the affected site. The vulnerability is exploitable remotely without authentication but requires user interaction, such as clicking a link. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but acknowledging the potential for integrity compromise. No patches or official fixes are currently linked, and no known exploits are reported in the wild. Organizations using the Coil Web Monetization plugin should monitor for updates and consider interim mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-9625 primarily concerns the integrity of WordPress sites utilizing the Coil Web Monetization plugin. While the vulnerability does not expose confidential data or cause denial of service, it enables attackers to perform unauthorized actions by exploiting CSRF, potentially altering site behavior or content. This can undermine trust in affected websites, especially those involved in digital content monetization or financial transactions. Given the plugin's role in web monetization, misuse could disrupt revenue streams or lead to fraudulent activities. Organizations with WordPress-based digital platforms, particularly those integrating Coil for monetization, face increased risk. The requirement for user interaction limits large-scale automated exploitation but targeted phishing or social engineering attacks against administrators remain a concern. The absence of known exploits suggests limited active threat currently, but the vulnerability's presence necessitates proactive defense to prevent future attacks. European entities in media, publishing, and online services sectors using this plugin should be especially vigilant.

Mitigation Recommendations

To mitigate CVE-2025-9625, organizations should first verify if they use the Coil Web Monetization plugin on their WordPress sites and identify the plugin version. Immediate steps include restricting administrative access and educating administrators about phishing risks to reduce the chance of clicking malicious links. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the coil-get-css-selector parameter can provide interim protection. Site administrators should monitor logs for unusual activity related to this parameter. Until an official patch is released, consider disabling or removing the plugin if feasible, especially on high-risk or critical sites. Developers and site owners can also implement additional nonce validation or CSRF tokens in custom code to harden the plugin's request handling. Regular backups and incident response plans should be updated to quickly recover from any compromise. Staying informed through vendor advisories and applying updates promptly once available is essential for long-term security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T19:12:46.528Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c305b35a0ab0a56271088

Added to database: 11/18/2025, 8:37:47 AM

Last enriched: 11/25/2025, 9:51:18 AM

Last updated: 1/7/2026, 8:49:49 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats