CVE-2025-26570

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the Glance That WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can exploit this to inject malicious scripts that execute when other users visit affected pages, potentially leading to stored XSS attacks. All WordPress sites using Glance That plugin versions up to 4.9 are affected.

💻 Affected Systems

Products:
  • Glance That WordPress Plugin
Versions: n/a through 4.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Glance That plugin enabled. Attack requires tricking authenticated users into visiting malicious pages.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that steal session cookies, redirect users to phishing sites, or perform administrative actions on behalf of authenticated users, potentially compromising the entire WordPress site.

🟠

Likely Case

Attackers create phishing pages that trick administrators into executing actions that inject malicious JavaScript, leading to session hijacking or content defacement for regular site visitors.

🟢

If Mitigated

With proper CSRF tokens and same-origin policies, the attack fails as requests from malicious sites are rejected, preventing unauthorized actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.9

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/glance-that/vulnerability/wordpress-glance-that-plugin-4-9-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Glance That' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patch is released.

🔧 Temporary Workarounds

Implement CSRF Protection

WordPress

Add CSRF tokens to all state-changing requests in the plugin

Requires code modification: Add wp_nonce_field() to forms and wp_verify_nonce() checks to form processing

Disable Plugin

WordPress CLI

Temporarily disable Glance That plugin until patched

wp plugin deactivate glance-that

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF patterns
  • Restrict admin access to trusted networks only and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Glance That for version number. If version is 4.9 or earlier, you are vulnerable.

Check Version:

wp plugin get glance-that --field=version

Verify Fix Applied:

After update, verify Glance That plugin version is higher than 4.9 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed nonce verification attempts in WordPress debug logs
  • Unexpected plugin activation/deactivation events

Network Indicators:

  • HTTP POST requests to wp-admin/admin-ajax.php with suspicious referer headers
  • Requests with missing or invalid _wpnonce parameters

SIEM Query:

source="wordpress.log" AND ("nonce" AND "failed") OR ("glance-that" AND "activated")

🔗 References

📤 Share & Export