Plattform
wordpress
Komponente
top-friends
Behoben in
0.3.1
CVE-2025-12827 describes a Cross-Site Request Forgery (XSRF) vulnerability affecting the Top Friends plugin for WordPress. This vulnerability allows unauthenticated attackers to potentially modify plugin settings. The issue impacts versions 0.0.0 through 0.3. A fix is available in a subsequent, unlisted version.
An attacker can exploit this XSRF vulnerability by crafting a malicious request that appears to originate from a legitimate user. If a site administrator clicks on this crafted link, the attacker can execute arbitrary actions within the Top Friends plugin, such as modifying settings or potentially gaining unauthorized access to sensitive data. The blast radius is limited to the plugin's functionality, but successful exploitation could lead to configuration changes impacting site functionality or user experience. This vulnerability highlights the importance of proper nonce validation in WordPress plugins to prevent unauthorized modifications.
This CVE was publicly disclosed on 2025-11-18. There are currently no known public exploits or active campaigns targeting this vulnerability. The EPSS score is pending evaluation. Monitor WordPress security advisories and plugin updates for further information.
WordPress websites using the Top Friends plugin, particularly those with site administrators who are susceptible to social engineering attacks. Shared hosting environments where plugin updates are managed centrally are also at increased risk.
• wordpress / composer / npm:
grep -r 'top_friends_options_subpanel' /var/www/html/wp-content/plugins/• generic web:
curl -I https://your-wordpress-site.com/wp-admin/admin.php?page=top-friends-settings | grep -i 'top_friends_options_subpanel'disclosure
Exploit-Status
EPSS
0.03% (8% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-12827 is to upgrade the Top Friends plugin to a version that includes the necessary nonce validation fixes. As a temporary workaround, consider implementing stricter access controls for plugin settings, limiting who can modify them. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the topfriendsoptions_subpanel() function. Regularly review WordPress plugin configurations and user permissions to identify and address potential vulnerabilities.
Kein bekannter Patch verfügbar. Bitte überprüfen Sie die Details der Schwachstelle eingehend und setzen Sie Schutzmaßnahmen basierend auf der Risikobereitschaft Ihrer Organisation um. Es kann am besten sein, die betroffene Software zu deinstallieren und eine Alternative zu finden.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-12827 is a Cross-Site Request Forgery (XSRF) vulnerability in the Top Friends WordPress plugin, allowing attackers to potentially modify plugin settings.
You are affected if your WordPress site uses the Top Friends plugin in versions 0.0.0 through 0.3.
Upgrade the Top Friends plugin to a version that includes the necessary nonce validation fixes. Check the plugin developer's website for updates.
As of now, there are no known public exploits or active campaigns targeting this vulnerability, but it's crucial to apply the fix.
Check the Top Friends plugin developer's website or the WordPress plugin repository for the official advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.