CVE-2025-32664

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Nepali Date Utilities WordPress plugin allows attackers to perform actions as authenticated users, leading to Stored Cross-Site Scripting (XSS). This affects all WordPress sites running Nepali Date Utilities versions up to 1.0.13. Attackers can inject malicious scripts that execute when other users view affected pages.

💻 Affected Systems

Products:
  • Nepali Date Utilities WordPress Plugin
Versions: n/a through 1.0.13
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on a WordPress site. The vulnerability is present in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript that steals administrator credentials, redirects users to phishing sites, or takes over the WordPress site by creating new admin accounts.

🟠

Likely Case

Attackers trick administrators into clicking malicious links that inject advertising scripts, cryptocurrency miners, or defacement content into the site.

🟢

If Mitigated

With proper CSRF tokens and input validation, the vulnerability is prevented, and only legitimate user actions are processed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user (typically an administrator) to click a malicious link or visit a crafted page. The CSRF leads to stored XSS payload injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.14 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/nepali-date-utilities/vulnerability/wordpress-nepali-date-utilities-plugin-1-0-13-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Nepali Date Utilities' and click 'Update Now' if available. 4. If no update appears, manually download version 1.0.14+ from WordPress.org, delete the old plugin, and upload the new version.

🔧 Temporary Workarounds

Disable Nepali Date Utilities Plugin

all

Temporarily deactivate the plugin until patched to prevent exploitation.

wp plugin deactivate nepali-date-utilities

Implement CSRF Protection Headers

linux

Add Content Security Policy (CSP) headers to limit script execution sources.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' https:"

🧯 If You Can't Patch

  • Restrict plugin access to trusted administrators only using role-based access controls.
  • Monitor WordPress admin activity logs for unauthorized plugin modifications or script injections.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Nepali Date Utilities for version number. If version is 1.0.13 or lower, the site is vulnerable.

Check Version:

wp plugin get nepali-date-utilities --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.0.14 or higher in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin-specific endpoints from unexpected IPs.
  • JavaScript injections in WordPress post/page content or plugin settings.

Network Indicators:

  • HTTP requests containing malicious script payloads in parameters like 'script', 'onerror', or 'javascript:'.

SIEM Query:

source="wordpress.log" AND ("nepali-date-utilities" OR "admin-ajax.php") AND (POST AND ("script" OR "onclick" OR "javascript:"))

🔗 References

📤 Share & Export