CVE-2025-48114

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the ShayanWeb Admin FontChanger WordPress plugin allows attackers to inject malicious scripts via stored XSS. This affects WordPress sites using the plugin from all versions through 1.9.1. Attackers can trick authenticated administrators into executing unwanted actions.

💻 Affected Systems

Products:
  • ShayanWeb Admin FontChanger WordPress Plugin
Versions: n/a through 1.9.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and an authenticated administrator to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that compromise administrator sessions, leading to complete site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Attackers inject malicious scripts that hijack administrator sessions, allowing them to modify site content, install backdoors, or steal sensitive data.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail, preventing script injection and maintaining site integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/shayanweb-admin-fontchanger/vulnerability/wordpress-shayanweb-admin-fontchanger-plugin-1-8-1-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ShayanWeb Admin FontChanger' and update to version 1.9.2 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin to prevent exploitation until patching is possible.

wp plugin deactivate shayanweb-admin-fontchanger

Implement CSRF Tokens

all

Add CSRF protection to WordPress forms if custom development is possible.

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only to reduce exposure to CSRF attacks.
  • Implement web application firewall (WAF) rules to block suspicious XSS payloads and CSRF attempts.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 1.9.1 or earlier, the site is vulnerable.

Check Version:

wp plugin get shayanweb-admin-fontchanger --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 1.9.2 or later in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php or plugin-specific endpoints from unexpected referrers
  • Administrator account performing suspicious actions like injecting scripts

Network Indicators:

  • HTTP requests with suspicious payloads in parameters, especially from external domains

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR plugin="shayanweb-admin-fontchanger") AND (referrer NOT CONTAINS "yourdomain.com" OR params CONTAINS "<script>")

🔗 References

📤 Share & Export