CVE-2025-5314
📋 TL;DR
This vulnerability allows unauthenticated attackers to inject malicious JavaScript via the 'pdf-source' parameter in the Dear Flipbook WordPress plugin. When a user clicks a specially crafted link, the script executes in their browser, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using this plugin up to version 2.3.65 are affected.
💻 Affected Systems
- Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, or redirect users to phishing pages.
Likely Case
Session hijacking of logged-in users, defacement of pages, or credential theft via malicious JavaScript execution.
If Mitigated
Limited impact if users have strong session management, CSP headers, or the site isn't internet-facing.
🎯 Exploit Status
Exploitation requires tricking users into clicking malicious links but doesn't require authentication. The vulnerability is in client-side JavaScript, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.3.66 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3319013/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Dear Flipbook' plugin. 4. Click 'Update Now' if available. 5. If manual update needed, download version 2.3.66+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Input Validation Web Application Firewall Rule
allBlock requests containing suspicious JavaScript in the pdf-source parameter
WAF rule: Block if ARGS:pdf-source contains '<script' or 'javascript:'
Content Security Policy Header
allImplement CSP to restrict script execution sources
Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.jsdelivr.net;"
Adjust domains based on your plugin's legitimate sources
🧯 If You Can't Patch
- Disable the Dear Flipbook plugin immediately via WordPress admin or by renaming its directory
- Use alternative PDF viewer plugins that don't have this vulnerability
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Dear Flipbook version. If version is 2.3.65 or lower, you're vulnerable.
Check Version:
wp plugin list --name='Dear Flipbook' --field=version (if WP-CLI installed) or check WordPress admin interface
Verify Fix Applied:
After updating, verify plugin version shows 2.3.66 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with pdf-source parameter containing script tags or JavaScript code
- Unusual referrer URLs in access logs
- Multiple failed PDF loading attempts
Network Indicators:
- Outbound connections to suspicious domains after PDF page loads
- Unusual JavaScript execution patterns in browser dev tools
SIEM Query:
source="web_access_logs" AND (uri="*pdf-source*" AND (uri="*<script*" OR uri="*javascript:*"))
🔗 References
- https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/dflip.js#L8861
- https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/dflip.min.js
- https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/libs/pdf.min.js
- https://plugins.trac.wordpress.org/changeset/3319013/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e316c636-2dd7-4d50-8c99-36f08ecf03ad?source=cve