Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9625: CWE-352 Cross-Site Request Forgery (CSRF) in interledger Coil Web Monetization

0
Medium
VulnerabilityCVE-2025-9625cvecve-2025-9625cwe-352
Published: Tue Nov 18 2025 (11/18/2025, 08:27:31 UTC)
Source: CVE Database V5
Vendor/Project: interledger
Product: Coil Web Monetization

Description

The Coil Web Monetization plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on the coil-get-css-selector parameter handling in the maybe_restrict_content function. This makes it possible for unauthenticated attackers to trigger CSS selector detection functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:05:59 UTC

Technical Analysis

CVE-2025-9625 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Coil Web Monetization plugin for WordPress, affecting all versions up to and including 2.0.2. The root cause is the absence or improper implementation of nonce validation on the coil-get-css-selector parameter within the maybe_restrict_content function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from forged sources. Without proper nonce validation, attackers can craft malicious URLs or forms that, when visited or submitted by an authenticated administrator, cause the plugin to execute unintended actions related to CSS selector detection. This vulnerability does not require the attacker to be authenticated but depends on social engineering to trick an administrator into clicking a malicious link or performing an action. The impact is limited to integrity since unauthorized actions can be triggered, but confidentiality and availability remain unaffected. The CVSS 3.1 base score is 4.3, reflecting low complexity of attack (no privileges required, network vector) but requiring user interaction. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The Coil Web Monetization plugin is used to enable web monetization features on WordPress sites, and this vulnerability could be leveraged to manipulate plugin behavior or site content indirectly through CSS selector detection mechanisms.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the Coil Web Monetization plugin. An attacker can cause unauthorized actions to be executed by tricking site administrators into clicking malicious links, potentially altering plugin behavior or site content related to CSS selector detection. Although confidentiality and availability are not directly impacted, the integrity compromise could lead to further exploitation or unauthorized changes that degrade trust or functionality. Organizations relying on Coil Web Monetization for revenue or content monetization could experience disruptions or manipulation of monetization features. Since exploitation requires user interaction from an administrator, the attack surface is limited but still significant for sites with multiple administrators or less cautious users. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed. Failure to mitigate could lead to targeted attacks against high-value WordPress sites leveraging this plugin, particularly those with active administrative users.

Mitigation Recommendations

1. Immediate mitigation involves updating the Coil Web Monetization plugin to a version that includes proper nonce validation once available. Monitor vendor announcements for patches. 2. Until a patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing the coil-get-css-selector parameter from untrusted sources. 3. Educate WordPress site administrators about the risks of clicking untrusted links, especially those that could trigger plugin actions. 4. Restrict administrative access to trusted networks or VPNs to reduce exposure to social engineering attacks. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts or requests. 6. Regularly audit plugin usage and monitor logs for unusual activity related to the coil-get-css-selector parameter or unexpected plugin behavior. 7. Consider disabling the Coil Web Monetization plugin temporarily if immediate patching is not feasible and the risk is unacceptable. These steps go beyond generic advice by focusing on specific parameters and user behavior related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T19:12:46.528Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c305b35a0ab0a56271088

Added to database: 11/18/2025, 8:37:47 AM

Last enriched: 2/26/2026, 6:05:59 PM

Last updated: 3/24/2026, 5:22:41 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses