CVE-2025-14354
CSRF in WordPress Resource Library Plugin Allows Admin Actions
Publication date: 2025-12-12
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | resource_library_for_logged_in_users | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources and context do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves Cross-Site Request Forgery (CSRF) in the Resource Library for Logged In Users WordPress plugin (up to version 1.4) due to missing nonce validation on administrative functions. Detection on a network or system would involve monitoring for suspicious HTTP requests that perform administrative actions (such as creating, editing, or deleting resources or categories) without proper authentication or nonce tokens. Since the vulnerability requires tricking an authenticated administrator into clicking a malicious link, detection could include: 1. Monitoring HTTP POST requests to the plugin's admin endpoints for missing or invalid nonce parameters. 2. Reviewing web server logs for unusual or unexpected POST requests to URLs related to resource or category management in the plugin. 3. Using WordPress security plugins or web application firewalls that can detect CSRF attempts or missing nonce usage. Specific commands are not provided in the resources, but general approaches include: - Using tools like curl or wget to test if administrative actions can be performed without valid nonce tokens. - Searching web server logs for POST requests to plugin URLs without valid nonce parameters. Example command to search Apache logs for POST requests to the plugin's resource management endpoints (adjust path as needed): grep 'POST .*wp-admin/admin.php.*page=ddrll' /var/log/apache2/access.log To test nonce enforcement manually, one might attempt a curl command to simulate a POST request without a nonce and observe if the action is allowed (this requires knowledge of exact parameters and URLs, which are not detailed in the resources). Since no explicit detection commands or scripts are provided in the resources, detailed detection commands cannot be given. [1, 2]
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the Resource Library for Logged In Users WordPress plugin (versions up to 1.4). It occurs because the plugin lacks nonce validation on several administrative functions, allowing an attacker to trick a site administrator into performing unauthorized actions such as creating, editing, or deleting resources and categories via a forged request.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to perform unauthorized administrative actions on your WordPress site if they can trick an administrator into clicking a malicious link. This could lead to unwanted changes like creating, editing, or deleting resources and categories without your consent, potentially disrupting site content management.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Resource Library for Logged In Users plugin to a version later than 1.4 where the nonce validation issue is fixed. Additionally, avoid clicking on suspicious links and educate site administrators about the risk of Cross-Site Request Forgery attacks. If an update is not available, consider disabling or removing the plugin until a patch is released.