Skip to main content

CVE-2025-9888: CWE-352 Cross-Site Request Forgery (CSRF) in yonifre Maspik – Ultimate Spam Protection

Medium
VulnerabilityCVE-2025-9888cvecve-2025-9888cwe-352
Published: Wed Sep 10 2025 (09/10/2025, 06:38:49 UTC)
Source: CVE Database V5
Vendor/Project: yonifre
Product: Maspik – Ultimate Spam Protection

Description

The Maspik – Ultimate Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.6. This is due to missing or incorrect nonce validation on the clear_log function. This makes it possible for unauthenticated attackers to clear all spam logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 09/10/2025, 07:01:27 UTC

Technical Analysis

CVE-2025-9888 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Maspik – Ultimate Spam Protection plugin for WordPress, developed by yonifre. This vulnerability exists in all versions up to and including 2.5.6 due to missing or incorrect nonce validation on the clear_log function. Nonces are security tokens used to verify that a request comes from a legitimate user and not from a malicious source. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a link), can clear all spam logs without proper authorization. This attack does not require the attacker to be authenticated themselves, but it does require user interaction from an administrator, making it a UI-required vulnerability. The CVSS 3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact is limited to integrity, specifically the unauthorized clearing of spam logs, which could hinder an administrator's ability to monitor and respond to spam or malicious activities. There is no indication of confidentiality or availability impact. No known exploits are currently in the wild, and no patches or updates have been linked yet. The vulnerability is categorized under CWE-352, a common web application security weakness related to CSRF attacks.

Potential Impact

For European organizations using WordPress with the Maspik – Ultimate Spam Protection plugin, this vulnerability could undermine the integrity of spam monitoring systems. Attackers could erase spam logs by tricking administrators into clicking malicious links, potentially hiding evidence of spam or malicious activities. This could delay detection and response to spam campaigns or targeted attacks, increasing the risk of further compromise or reputational damage. While the vulnerability does not directly expose sensitive data or cause service disruption, the loss of audit trails and monitoring data can weaken security posture. Organizations with strict compliance requirements around logging and monitoring (such as GDPR mandates for security incident detection) may face challenges in demonstrating adequate controls if logs are tampered with. The risk is higher in environments where administrators frequently access WordPress admin interfaces and may be susceptible to phishing or social engineering attacks.

Mitigation Recommendations

1. Immediate mitigation should include educating WordPress administrators about the risk of clicking untrusted links while logged into the admin panel, especially related to spam log management. 2. Implement web application firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the clear_log function endpoint. 3. Restrict administrative access to trusted IP addresses or VPNs to reduce exposure to CSRF attacks. 4. Monitor and audit spam log clearing events closely to detect unusual or unauthorized activity. 5. Until an official patch is released, consider disabling or limiting the use of the clear_log function if feasible. 6. Follow best practices for WordPress security, including keeping all plugins and core software updated and using security plugins that enforce nonce validation and CSRF protections. 7. Once a patch is available, prioritize prompt application of updates to the Maspik plugin to remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-02T22:26:18.813Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c11e7ee55cc6e90d9f3b99

Added to database: 9/10/2025, 6:45:18 AM

Last enriched: 9/10/2025, 7:01:27 AM

Last updated: 9/10/2025, 8:33:16 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats