CVE-2025-14354
Unknown Unknown - Not Provided
CSRF in WordPress Resource Library Plugin Allows Admin Actions

Publication date: 2025-12-12

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Resource Library for Logged In Users plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to perform various unauthorized actions including creating, editing, and deleting resources and categories via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2025-12-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress resource_library_for_logged_in_users *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources and context do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves Cross-Site Request Forgery (CSRF) in the Resource Library for Logged In Users WordPress plugin (up to version 1.4) due to missing nonce validation on administrative functions. Detection on a network or system would involve monitoring for suspicious HTTP requests that perform administrative actions (such as creating, editing, or deleting resources or categories) without proper authentication or nonce tokens. Since the vulnerability requires tricking an authenticated administrator into clicking a malicious link, detection could include: 1. Monitoring HTTP POST requests to the plugin's admin endpoints for missing or invalid nonce parameters. 2. Reviewing web server logs for unusual or unexpected POST requests to URLs related to resource or category management in the plugin. 3. Using WordPress security plugins or web application firewalls that can detect CSRF attempts or missing nonce usage. Specific commands are not provided in the resources, but general approaches include: - Using tools like curl or wget to test if administrative actions can be performed without valid nonce tokens. - Searching web server logs for POST requests to plugin URLs without valid nonce parameters. Example command to search Apache logs for POST requests to the plugin's resource management endpoints (adjust path as needed): grep 'POST .*wp-admin/admin.php.*page=ddrll' /var/log/apache2/access.log To test nonce enforcement manually, one might attempt a curl command to simulate a POST request without a nonce and observe if the action is allowed (this requires knowledge of exact parameters and URLs, which are not detailed in the resources). Since no explicit detection commands or scripts are provided in the resources, detailed detection commands cannot be given. [1, 2]


Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the Resource Library for Logged In Users WordPress plugin (versions up to 1.4). It occurs because the plugin lacks nonce validation on several administrative functions, allowing an attacker to trick a site administrator into performing unauthorized actions such as creating, editing, or deleting resources and categories via a forged request.


How can this vulnerability impact me? :

An attacker can exploit this vulnerability to perform unauthorized administrative actions on your WordPress site if they can trick an administrator into clicking a malicious link. This could lead to unwanted changes like creating, editing, or deleting resources and categories without your consent, potentially disrupting site content management.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Resource Library for Logged In Users plugin to a version later than 1.4 where the nonce validation issue is fixed. Additionally, avoid clicking on suspicious links and educate site administrators about the risk of Cross-Site Request Forgery attacks. If an update is not available, consider disabling or removing the plugin until a patch is released.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart