CVE-2025-32502

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the lemmentwickler ePaper Lister for Yumpu WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WordPress sites using the plugin from all versions up to and including 1.4.0. Attackers can trick authenticated administrators into executing malicious actions that inject persistent scripts into vulnerable sites.

💻 Affected Systems

Products:
  • lemmentwickler ePaper Lister for Yumpu (WordPress plugin)
Versions: All versions up to and including 1.4.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Attack requires tricking authenticated users (typically administrators) into visiting malicious pages.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through persistent XSS payloads that steal administrator credentials, deface websites, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers inject malicious JavaScript that steals session cookies, performs unauthorized actions, or displays fraudulent content to users.

🟢

If Mitigated

Limited impact with proper CSRF tokens and Content Security Policy (CSP) headers in place, though stored XSS payloads may still execute if previously injected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users, but the technical complexity is low once the user is tricked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/magazine-lister-for-yumpu/vulnerability/wordpress-epaper-lister-for-yumpu-plugin-1-4-0-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard
2. Navigate to Plugins → Installed Plugins
3. Find 'ePaper Lister for Yumpu'
4. Click 'Update Now' if update is available
5. Alternatively, download version 1.4.1+ from WordPress repository and replace plugin files

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to all form submissions and state-changing operations

Requires custom WordPress development - implement nonce verification using wp_nonce_field() and wp_verify_nonce()

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent XSS execution

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or implement via WordPress security plugin

🧯 If You Can't Patch

  • Disable or remove the ePaper Lister for Yumpu plugin entirely
  • Restrict plugin access to trusted administrators only and implement strict user education about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'ePaper Lister for Yumpu' version 1.4.0 or earlier

Check Version:

wp plugin list --name='epaper-lister-for-yumpu' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 1.4.1 or later in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin-specific endpoints
  • Multiple failed CSRF token validations
  • Unexpected JavaScript injection in database content

Network Indicators:

  • Cross-origin requests to plugin endpoints without proper referrer headers
  • Suspicious iframe or form submissions from external sites

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" OR "yumpu") AND (POST OR "csrf")

🔗 References

📤 Share & Export