CVE-2025-23902

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Error Notification plugin allows attackers to trick authenticated administrators into performing unintended actions. This affects all WordPress sites using Error Notification plugin versions up to 0.2.7. Successful exploitation could lead to stored XSS attacks or other administrative actions.

💻 Affected Systems

Products:
  • WordPress Error Notification plugin
Versions: n/a through 0.2.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Error Notification plugin enabled and an authenticated administrator to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that execute in visitors' browsers, potentially stealing credentials, session tokens, or performing actions on behalf of users.

🟠

Likely Case

Attackers create malicious pages that trick logged-in administrators into changing plugin settings or injecting malicious content when they visit while authenticated.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into visiting malicious pages while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.2.7

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/error-notification/vulnerability/wordpress-error-notification-plugin-0-2-7-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Error Notification' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin.

🔧 Temporary Workarounds

Implement CSRF tokens manually

WordPress

Add CSRF protection to plugin forms if you cannot update immediately

Requires custom PHP development to add nonce verification to plugin forms

🧯 If You Can't Patch

  • Deactivate and remove the Error Notification plugin entirely
  • Implement strict access controls and user training to prevent administrators from visiting untrusted sites while authenticated

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Error Notification version 0.2.7 or earlier

Check Version:

wp plugin list --name=error-notification --field=version

Verify Fix Applied:

Verify plugin version is higher than 0.2.7 or plugin is removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin.php from unexpected referrers
  • Multiple failed CSRF token validations

Network Indicators:

  • HTTP requests with missing or invalid nonce parameters to plugin endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND referrer NOT CONTAINS "yourdomain.com")

🔗 References

📤 Share & Export