CVE-2025-32669

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in MERGADO Mergado Pack WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WordPress sites using Mergado Pack versions up to 4.1.1. Attackers can trick authenticated administrators into executing malicious actions that inject persistent scripts.

💻 Affected Systems

Products:
  • MERGADO Mergado Pack WordPress Plugin
Versions: n/a through 4.1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Mergado Pack plugin installed and activated. The vulnerability requires an authenticated administrator to be tricked into visiting a malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript that steals administrator credentials, redirects users to phishing sites, or takes full control of the WordPress site when administrators view compromised pages.

🟠

Likely Case

Attackers create phishing pages that trick logged-in administrators into unknowingly submitting forms that inject malicious scripts into the site's content, leading to session hijacking or defacement.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail at the initial request stage, preventing any XSS payload from being stored.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an authenticated administrator. The CSRF-to-XSS chain is well-documented in the reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/mergado-marketing-pack/vulnerability/wordpress-mergado-pack-plugin-4-0-2-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'MERGADO Mergado Pack' and check if update is available. 4. Click 'Update Now' to upgrade to version 4.1.2 or later. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Implement CSRF Tokens Manually

all

Add CSRF protection tokens to all forms in the plugin if you cannot update immediately.

Requires custom PHP coding to add nonce verification to form submissions

Disable Plugin Temporarily

linux

Deactivate the Mergado Pack plugin until patched to eliminate the attack surface.

wp plugin deactivate mergado-marketing-pack

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only using firewall rules or VPN.
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Mergado Pack version. If version is 4.1.1 or lower, you are vulnerable.

Check Version:

wp plugin get mergado-marketing-pack --field=version

Verify Fix Applied:

After updating, verify the plugin shows version 4.1.2 or higher in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin-specific endpoints from unexpected referrers
  • Administrator accounts performing unexpected plugin configuration changes

Network Indicators:

  • HTTP requests with suspicious parameters containing script tags or JavaScript payloads
  • Traffic patterns showing administrators accessing external malicious sites

SIEM Query:

source="wordpress.log" AND ("mergado" OR "admin-ajax.php") AND (POST AND ("script" OR "javascript" OR "onerror"))

🔗 References

📤 Share & Export