CVE-2025-9882
BaseFortify
Publication date: 2025-09-20
Last updated on: 2025-09-22
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| michaelbo | osticket_wp_bridge | 1.9.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the osTicket WP Bridge plugin for WordPress is a Cross-Site Request Forgery (CSRF) issue affecting all versions up to and including 1.9.2. It occurs because the plugin lacks proper nonce validation on a function, allowing unauthenticated attackers to trick a site administrator into performing actions such as updating settings or injecting malicious web scripts by sending forged requests.
How can this vulnerability impact me? :
This vulnerability can allow attackers to perform unauthorized actions on your WordPress site by exploiting the trust of an administrator. Specifically, attackers can update plugin settings or inject malicious scripts, potentially compromising the site's integrity, security, and user data.
What immediate steps should I take to mitigate this vulnerability?
Immediate steps to mitigate this vulnerability include disabling or removing the osTicket WP Bridge plugin from your WordPress installation, as the plugin has been temporarily closed and removed from download availability pending a full security review. Additionally, avoid clicking on suspicious links that could trigger forged requests and monitor for any unauthorized changes in your WordPress settings. [1]