CVE-2025-30865

4.3 MEDIUM

📋 TL;DR

This Cross-Site Request Forgery (CSRF) vulnerability in the 3DPrint Lite WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites running 3DPrint Lite versions up to 2.1.3.5. Attackers could modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • 3DPrint Lite WordPress Plugin
Versions: n/a through 2.1.3.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the 3DPrint Lite plugin installed and activated. Requires an authenticated administrator to be tricked into visiting a malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could completely compromise the WordPress site by tricking an admin into changing critical settings, installing malicious plugins, or granting administrative privileges to the attacker.

🟠

Likely Case

Attackers modify plugin settings, change configuration options, or perform other administrative actions within the plugin's scope, potentially disrupting 3D printing functionality or site operations.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is minimal as legitimate administrative actions would require explicit user intent with proper token validation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement. Exploitation requires social engineering to trick an authenticated admin into visiting a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.3.6 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/3dprint-lite/vulnerability/wordpress-3dprint-lite-plugin-2-1-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find '3DPrint Lite'
4. Click 'Update Now' if available
5. If no update shows, download latest version from WordPress.org
6. Deactivate old plugin
7. Upload and activate new version

🔧 Temporary Workarounds

CSRF Protection Middleware

all

Implement custom CSRF token validation for all plugin admin endpoints

Add nonce verification to all plugin admin form handlers and AJAX endpoints

Plugin Deactivation

linux

Temporarily disable the plugin until patched

wp plugin deactivate 3dprint-lite

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → 3DPrint Lite → Version. If version is 2.1.3.5 or earlier, you are vulnerable.

Check Version:

wp plugin get 3dprint-lite --field=version

Verify Fix Applied:

After updating, verify version shows 2.1.3.6 or later in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed admin actions from same IP
  • Unexpected plugin configuration changes
  • Admin actions without corresponding user activity

Network Indicators:

  • POST requests to plugin admin endpoints without proper referrer headers
  • Requests with missing or invalid nonce tokens

SIEM Query:

source="wordpress" action="plugin_settings_change" user="admin" referrer="null" OR referrer="external_domain"

🔗 References

📤 Share & Export