CVE-2025-27359
BaseFortify
Publication date: 2025-06-06
Last updated on: 2026-04-28
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) in the WordPress WP Media File Type Manager plugin up to version 2.3.0. It allows an attacker to trick authenticated users with higher privileges into performing unwanted actions, such as unauthorized settings changes, without their consent. The attacker does not need to be authenticated to exploit this issue. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized changes in the plugin's settings by tricking privileged users into executing actions they did not intend. This could compromise the security or functionality of your WordPress site by allowing attackers to manipulate plugin configurations without direct access. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this CSRF vulnerability in WP Media File Type Manager is challenging because plugin-based malware scanners may be unreliable. There are no specific commands provided for detection. Users are advised to monitor for suspicious activity and consider professional incident response services if compromise is suspected. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying virtual patching (vPatching) offered by Patchstack, which provides automatic protection without impacting performance. Users should monitor for official updates or patches and consider professional incident response if compromise is suspected. Since no official patch is available yet, disabling the plugin or limiting access to trusted users may also reduce risk. [1]