CVE-2025-31880

4.3 MEDIUM

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Stylemix Pearl WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. This affects WordPress sites using Pearl plugin versions up to 1.3.9.

💻 Affected Systems

Products:
  • Stylemix Pearl WordPress Plugin
Versions: n/a through 1.3.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Pearl plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an administrator into changing plugin settings, modifying content, or potentially performing actions that compromise the WordPress site.

🟠

Likely Case

Attackers could manipulate plugin settings or create/modify content without the administrator's knowledge.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is minimal as it requires user interaction.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into clicking a malicious link or visiting a compromised page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.0 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/pearl-header-builder/vulnerability/wordpress-pearl-plugin-1-3-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Pearl' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection to Pearl plugin forms manually

Use Security Plugin

all

Install WordPress security plugin with CSRF protection

🧯 If You Can't Patch

  • Restrict plugin access to trusted administrators only
  • Implement web application firewall with CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Pearl version

Check Version:

wp plugin list --name=pearl --field=version

Verify Fix Applied:

Verify Pearl plugin version is 1.4.0 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected plugin setting changes
  • Unauthorized form submissions to Pearl endpoints

Network Indicators:

  • Requests to Pearl admin endpoints with missing CSRF tokens

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "pearl") AND http_method="POST"

🔗 References

📤 Share & Export