CVE-2025-28867

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the stesvis Frontpage category filter WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites using this plugin from initial release through version 1.0.2. The vulnerability requires an authenticated admin session to be exploited.

💻 Affected Systems

Products:
  • stesvis Frontpage category filter WordPress plugin
Versions: n/a through 1.0.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and an authenticated admin session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an admin into changing plugin settings, modifying site configuration, or potentially performing other administrative actions depending on plugin capabilities.

🟠

Likely Case

Attackers could modify category filter settings, potentially disrupting site functionality or changing content display rules.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts would fail or be detected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require social engineering to trick authenticated users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/frontpage-category-filter/vulnerability/wordpress-frontpage-category-filter-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Frontpage category filter'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate frontpage-category-filter

CSRF Protection Middleware

all

Implement additional CSRF protection at web server or application level

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only
  • Implement strict SameSite cookie policies and Content Security Policy headers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Frontpage category filter > Version. If version is 1.0.2 or earlier, you are vulnerable.

Check Version:

wp plugin get frontpage-category-filter --field=version

Verify Fix Applied:

After update, verify plugin version shows 1.0.3 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected POST requests to frontpage-category-filter admin endpoints
  • Multiple failed CSRF token validations

Network Indicators:

  • External domains making requests to admin-ajax.php with frontpage-category-filter actions
  • Suspicious referer headers in admin requests

SIEM Query:

source="wordpress.log" AND "frontpage-category-filter" AND ("admin-ajax" OR "wp-admin") AND POST

🔗 References

📤 Share & Export