CVE-2025-1436

7.1 HIGH

📋 TL;DR

This vulnerability in the Limit Bio WordPress plugin allows attackers to trick logged-in administrators into executing Cross-Site Request Forgery (CSRF) attacks that inject malicious JavaScript into the site. The stored XSS payloads can then affect all users visiting the compromised pages. WordPress sites using the Limit Bio plugin version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • Limit Bio WordPress Plugin
Versions: through 1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Limit Bio plugin enabled and an administrator logged in to be exploited.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that steal administrator credentials, redirect users to phishing sites, or deface the entire website for all visitors.

🟠

Likely Case

Attackers would use CSRF to inject malicious JavaScript that steals session cookies or redirects users to malicious sites, potentially compromising user accounts.

🟢

If Mitigated

With proper CSRF protection and input validation, the attack would fail, preventing any unauthorized settings changes or script injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking a logged-in administrator into clicking a malicious link or visiting a compromised page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0 (check plugin repository for latest)

Vendor Advisory: https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Limit Bio' plugin. 4. Click 'Update Now' if available. 5. If no update is available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Disable Limit Bio Plugin

WordPress

Temporarily disable the vulnerable plugin until a patch is available.

wp plugin deactivate limit-bio

Implement CSRF Protection

WordPress

Add custom CSRF tokens to the plugin's settings update functionality.

🧯 If You Can't Patch

  • Remove the Limit Bio plugin entirely and use alternative bio/author profile solutions.
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Limit Bio' version 1.0 or earlier.

Check Version:

wp plugin get limit-bio --field=version

Verify Fix Applied:

Verify the plugin version is updated beyond 1.0 in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin settings endpoints
  • Administrator account performing unexpected settings changes

Network Indicators:

  • HTTP requests with suspicious JavaScript payloads in POST parameters
  • CSRF attack patterns with referrer mismatches

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "limit-bio") AND http_method="POST" AND (param CONTAINS "script" OR param CONTAINS "javascript")

🔗 References

📤 Share & Export