CVE-2025-23793

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Auto FTP WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WordPress sites using Auto FTP plugin versions up to 1.0.1. Attackers can trick authenticated administrators into executing malicious actions that inject persistent scripts.

💻 Affected Systems

Products:
  • Turcu Ciprian Auto FTP WordPress Plugin
Versions: n/a through 1.0.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and an authenticated admin user to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through admin account compromise, data theft, malware distribution to visitors, and defacement.

🟠

Likely Case

Session hijacking, credential theft from administrators, and injection of malicious scripts that affect site visitors.

🟢

If Mitigated

Limited impact with proper CSRF tokens and Content Security Policy (CSP) in place, though XSS payloads could still execute if other protections fail.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick an authenticated admin into clicking a malicious link. The stored XSS payload persists after successful CSRF.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0.1 (check plugin repository for latest)

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/auto-ftp/vulnerability/wordpress-auto-ftp-plugin-1-0-1-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Auto FTP' and update to the latest version. 4. If no update is available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to plugin forms if custom patching is possible.

Enable Content Security Policy (CSP)

all

Configure CSP headers to mitigate XSS impact by restricting script sources.

Header set Content-Security-Policy "default-src 'self'; script-src 'self'" in .htaccess or server config

🧯 If You Can't Patch

  • Deactivate and remove the Auto FTP plugin immediately.
  • Implement strict access controls and monitor admin user activities for suspicious behavior.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel under Plugins > Installed Plugins for Auto FTP version 1.0.1 or earlier.

Check Version:

wp plugin list --name=auto-ftp --field=version (if WP-CLI is installed)

Verify Fix Applied:

Confirm plugin version is updated beyond 1.0.1 or that the plugin is deactivated/removed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Auto FTP plugin endpoints from unexpected sources
  • Admin user sessions with unexpected form submissions

Network Indicators:

  • HTTP requests with suspicious parameters or script tags targeting plugin paths

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "auto-ftp") AND (method="POST" AND user_agent NOT IN expected_admin_agents)

🔗 References

📤 Share & Export