CVE-2025-49351
📋 TL;DR
This CSRF vulnerability in the WordPress Create Posts & Terms plugin allows attackers to trick authenticated administrators into performing unintended actions, which can lead to stored cross-site scripting (XSS). It affects all WordPress sites using the plugin version 1.3.1 or earlier. Attackers can inject malicious scripts that execute in victims' browsers.
💻 Affected Systems
- WordPress Create Posts & Terms Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject persistent malicious scripts that steal administrator credentials, hijack sessions, deface websites, or redirect users to malicious sites whenever vulnerable pages are visited.
Likely Case
Attackers create fake admin interfaces or links that trick logged-in administrators into executing actions that inject malicious JavaScript into website content.
If Mitigated
With proper CSRF protections and content security policies, the attack surface is reduced, though the vulnerability still exists in the codebase.
🎯 Exploit Status
CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick authenticated users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >1.3.1
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Create Posts & Terms' plugin. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate create-posts-terms
Implement CSRF Tokens
allAdd CSRF protection to plugin forms if custom patching is possible
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use web application firewall (WAF) rules to detect and block CSRF attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Create Posts & Terms' version <= 1.3.1
Check Version:
wp plugin get create-posts-terms --field=version
Verify Fix Applied:
Verify plugin version is >1.3.1 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to plugin admin endpoints without referrer headers
- Multiple failed CSRF token validations
Network Indicators:
- Cross-origin requests to plugin endpoints from unexpected domains
SIEM Query:
source="wordpress.log" AND "create-posts-terms" AND ("POST" OR "admin-ajax")