Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9892: CWE-352 Cross-Site Request Forgery (CSRF) in devrix Restrict User Registration

0
Medium
VulnerabilityCVE-2025-9892cvecve-2025-9892cwe-352
Published: Fri Oct 03 2025 (10/03/2025, 11:17:16 UTC)
Source: CVE Database V5
Vendor/Project: devrix
Product: Restrict User Registration

Description

The Restrict User Registration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the update() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 10/03/2025, 11:28:52 UTC

Technical Analysis

CVE-2025-9892 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Restrict User Registration' developed by devrix. This vulnerability exists in all versions up to and including 1.0.1 due to missing or incorrect nonce validation in the plugin's update() function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, if executed by an authenticated site administrator (e.g., by clicking a link), can update the plugin's settings without proper authorization. The vulnerability does not require the attacker to be authenticated themselves, but it does rely on social engineering to trick an administrator into performing the action. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, no user interaction from the attacker side, and impacts integrity by allowing unauthorized modification of plugin settings. Confidentiality and availability are not impacted. No known exploits in the wild have been reported so far. The vulnerability is classified under CWE-352, which covers CSRF issues where state-changing requests can be forged. Since the plugin controls user registration restrictions, unauthorized changes could potentially weaken site security policies, allowing unwanted registrations or bypassing restrictions, which could lead to further exploitation or abuse of the site.

Potential Impact

For European organizations using WordPress sites with the devrix Restrict User Registration plugin, this vulnerability poses a moderate risk. Unauthorized modification of plugin settings could lead to a relaxation of user registration controls, potentially allowing malicious actors to create unauthorized accounts or bypass registration restrictions. This could facilitate spam registrations, unauthorized access attempts, or serve as a foothold for further attacks such as privilege escalation or data exfiltration. Organizations in sectors with strict data protection regulations (e.g., GDPR) could face compliance risks if unauthorized users gain access or if the integrity of user management is compromised. The impact is particularly relevant for websites that rely on controlled user registration for community portals, intranets, or customer-facing services. While the vulnerability does not directly expose confidential data or cause denial of service, the integrity compromise can indirectly lead to more severe security incidents if exploited as part of a broader attack chain.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately update the devrix Restrict User Registration plugin to a patched version once available. In the absence of an official patch, administrators can implement manual nonce validation in the update() function to ensure that all state-changing requests include valid security tokens. Additionally, organizations should educate site administrators about the risks of clicking on unsolicited links, especially those that could trigger administrative actions. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help reduce CSRF risks. Monitoring and logging changes to plugin settings can provide early detection of unauthorized modifications. Restricting administrative access to trusted networks or VPNs and enforcing multi-factor authentication (MFA) for admin accounts can further reduce the risk of exploitation. Regular security audits of WordPress plugins and configurations are recommended to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-02T23:02:42.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dfb277c3835a5fbe033cb3

Added to database: 10/3/2025, 11:24:39 AM

Last enriched: 10/3/2025, 11:28:52 AM

Last updated: 10/7/2025, 6:27:31 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats