Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9893: CWE-352 Cross-Site Request Forgery (CSRF) in milankyada VM Menu Reorder plugin

0
Medium
VulnerabilityCVE-2025-9893cvecve-2025-9893cwe-352
Published: Sat Sep 27 2025 (09/27/2025, 06:47:16 UTC)
Source: CVE Database V5
Vendor/Project: milankyada
Product: VM Menu Reorder plugin

Description

The VM Menu Reorder plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the vm_set_to_default function. This makes it possible for unauthenticated attackers to reset all menu reordering settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:21:03 UTC

Technical Analysis

The VM Menu Reorder plugin for WordPress, developed by milankyada, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-9893. This vulnerability affects all versions up to and including 1.0.0. The root cause is the absence or improper implementation of nonce validation on the vm_set_to_default function, which is responsible for resetting menu reorder settings. Nonce validation is a security mechanism used to ensure that requests are intentional and originate from legitimate users. Without this protection, an attacker can craft a malicious web request that, when visited by an authenticated site administrator, triggers the reset of all menu reorder settings without their consent. The attack does not require the attacker to be authenticated but does require the administrator to interact with the malicious link or request. The vulnerability impacts the integrity of the website's menu configuration but does not compromise confidentiality or availability. The CVSS v3.1 score of 4.3 reflects a medium severity, considering the ease of exploitation (no authentication required), the need for user interaction, and the limited impact scope. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. This vulnerability highlights the importance of proper nonce implementation in WordPress plugins to prevent CSRF attacks.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites' menu configurations. An attacker exploiting this flaw can reset all menu reorder settings, potentially disrupting site navigation and user experience. While this does not directly expose sensitive data or cause denial of service, it can lead to administrative overhead, confusion, and potential loss of trust from site visitors. For organizations relying heavily on customized navigation for user engagement or e-commerce, this disruption could indirectly affect business operations and revenue. Since exploitation requires tricking an administrator into clicking a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with less security training. The vulnerability does not affect confidentiality or availability, limiting the overall damage scope. However, repeated or targeted exploitation could be used as part of a broader attack strategy to undermine site integrity.

Mitigation Recommendations

To mitigate this vulnerability, site administrators and plugin developers should ensure that nonce validation is correctly implemented on all state-changing functions, including vm_set_to_default. Plugin maintainers should release an updated version of the VM Menu Reorder plugin that includes proper nonce checks. Until a patch is available, administrators can manually inspect and modify the plugin code to add nonce verification or disable the plugin if feasible. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received via email or untrusted sources. Employing web application firewalls (WAFs) that can detect and block CSRF attempts may provide an additional layer of defense. Regular backups of site configurations will help restore settings if exploitation occurs. Monitoring administrative actions and logs for unusual activity can also aid in early detection of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-02T23:07:29.206Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d87cd25d6228f86ddc928e

Added to database: 9/28/2025, 12:09:54 AM

Last enriched: 2/26/2026, 6:21:03 PM

Last updated: 3/22/2026, 5:58:16 PM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses