CVE-2025-5314

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious JavaScript via the 'pdf-source' parameter in the Dear Flipbook WordPress plugin. When a user clicks a specially crafted link, the script executes in their browser, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using this plugin up to version 2.3.65 are affected.

💻 Affected Systems

Products:
  • Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer WordPress plugin
Versions: All versions up to and including 2.3.65
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. The vulnerability is in the JavaScript files that handle PDF rendering.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, or redirect users to phishing pages.

🟠

Likely Case

Session hijacking of logged-in users, defacement of pages, or credential theft via malicious JavaScript execution.

🟢

If Mitigated

Limited impact if users have strong session management, CSP headers, or the site isn't internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking malicious links but doesn't require authentication. The vulnerability is in client-side JavaScript, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.66 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3319013/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Dear Flipbook' plugin. 4. Click 'Update Now' if available. 5. If manual update needed, download version 2.3.66+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Block requests containing suspicious JavaScript in the pdf-source parameter

WAF rule: Block if ARGS:pdf-source contains '<script' or 'javascript:'

Content Security Policy Header

all

Implement CSP to restrict script execution sources

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.jsdelivr.net;"
Adjust domains based on your plugin's legitimate sources

🧯 If You Can't Patch

  • Disable the Dear Flipbook plugin immediately via WordPress admin or by renaming its directory
  • Use alternative PDF viewer plugins that don't have this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Dear Flipbook version. If version is 2.3.65 or lower, you're vulnerable.

Check Version:

wp plugin list --name='Dear Flipbook' --field=version (if WP-CLI installed) or check WordPress admin interface

Verify Fix Applied:

After updating, verify plugin version shows 2.3.66 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with pdf-source parameter containing script tags or JavaScript code
  • Unusual referrer URLs in access logs
  • Multiple failed PDF loading attempts

Network Indicators:

  • Outbound connections to suspicious domains after PDF page loads
  • Unusual JavaScript execution patterns in browser dev tools

SIEM Query:

source="web_access_logs" AND (uri="*pdf-source*" AND (uri="*<script*" OR uri="*javascript:*"))

🔗 References

📤 Share & Export