CVE-2026-25024
CSRF Vulnerability in ThirstyAffiliates Plugin Allows Unauthorized Actions
Publication date: 2026-02-03
Last updated on: 2026-02-03
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| blair_williams | thirstyaffiliates | to 3.11.9 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The immediate and recommended mitigation step is to update the ThirstyAffiliates plugin to version 3.11.10 or later, where this vulnerability has been fixed.
Additionally, consider applying automated updates or rapid mitigation tools provided by Patchstack to ensure your system remains protected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this Cross-Site Request Forgery (CSRF) vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-25024 is a Cross Site Request Forgery (CSRF) vulnerability affecting the WordPress ThirstyAffiliates Plugin versions up to and including 3.11.9.
This vulnerability allows a malicious actor to trick higher privileged users into executing unwanted actions while authenticated, by having them click a malicious link, visit a crafted page, or submit a form.
The issue requires user interaction and does not affect unauthenticated users directly.
It is classified under OWASP Top 10 A1: Broken Access Control with a CVSS score of 5.4, indicating low severity and low priority.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to perform unauthorized actions on your behalf if you are a higher privileged user and interact with a malicious link, page, or form.
Such actions could lead to unintended changes or operations within the ThirstyAffiliates plugin while you are authenticated.
However, the vulnerability requires user interaction and does not affect unauthenticated users directly, and it is considered low severity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability is a Cross Site Request Forgery (CSRF) issue affecting authenticated users of the ThirstyAffiliates WordPress plugin up to version 3.11.9. Detection involves verifying the plugin version installed on your WordPress site.'}, {'type': 'paragraph', 'content': 'You can detect if your system is vulnerable by checking the installed version of the ThirstyAffiliates plugin. For example, you can use the following command in the WordPress installation directory to check the plugin version:'}, {'type': 'list_item', 'content': "grep 'Version:' wp-content/plugins/thirstyaffiliates/thirstyaffiliates.php"}, {'type': 'paragraph', 'content': 'If the version is less than or equal to 3.11.9, your system is vulnerable to this CSRF issue.'}] [1]