CVE-2025-39530

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the dsky Site Search 360 WordPress plugin allows attackers to inject malicious scripts that execute when administrators view plugin settings. This stored XSS attack affects all WordPress sites using Site Search 360 versions up to 2.1.7. Attackers can hijack administrator sessions and potentially take over the WordPress site.

💻 Affected Systems

Products:
  • dsky Site Search 360 WordPress Plugin
Versions: n/a through 2.1.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator interaction with malicious link while authenticated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through administrator account compromise, leading to data theft, defacement, or malware distribution to visitors.

🟠

Likely Case

Session hijacking of administrators, unauthorized plugin configuration changes, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper CSRF protections and content security policies in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated administrators into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/site-search-360/vulnerability/wordpress-site-search-360-plugin-2-1-7-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Site Search 360' and click 'Update Now'. 4. Verify version is 2.1.8 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate site-search-360

Implement CSRF Tokens

all

Add CSRF protection to WordPress forms if custom implementation is possible.

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Site Search 360 > Version. If version is 2.1.7 or lower, you are vulnerable.

Check Version:

wp plugin get site-search-360 --field=version

Verify Fix Applied:

After update, confirm version shows 2.1.8 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized plugin setting changes in WordPress logs
  • Suspicious POST requests to /wp-admin/admin.php?page=site-search-360

Network Indicators:

  • Unexpected outbound connections from WordPress admin area
  • CSRF attack patterns in web server logs

SIEM Query:

source="wordpress.log" AND ("site-search-360" AND "admin.php") AND status=200

🔗 References

📤 Share & Export