Plattform
wordpress
Komponente
thim-core
Behoben in
2.4.0
A Cross-Site Request Forgery (CSRF) vulnerability exists in ThimPress Thim Core, potentially allowing attackers to perform unauthorized actions on behalf of authenticated users. This vulnerability impacts versions prior to 2.4.0. The vulnerability has been publicly disclosed and a fix is available in version 2.4.0.
The CSRF vulnerability in Thim Core allows an attacker to craft malicious requests that appear to originate from a legitimate user. Successful exploitation could lead to unauthorized modifications of user profiles, changes to site settings, or other actions depending on the functionality exposed through the Thim Core plugin. The attacker does not need to authenticate as the target user; they simply need to trick the user's browser into executing the malicious request while the user is authenticated. This could be achieved through phishing emails, malicious websites, or compromised advertisements.
The vulnerability was publicly disclosed on 2026-01-05. There are currently no known public proof-of-concept exploits available. The vulnerability is not listed on the CISA KEV catalog at the time of this writing. The medium CVSS score indicates a moderate risk of exploitation.
Websites using Thim Core plugin versions prior to 2.4.0 are at risk. Specifically, sites with user roles that have administrative privileges are particularly vulnerable, as an attacker could leverage CSRF to escalate their privileges.
• wordpress / composer / npm:
grep -r 'thim_core_settings' /var/www/html/• generic web:
curl -I https://your-wordpress-site.com/wp-admin/admin-ajax.php?action=thim_core_settings&nonce=malicious_nonce | grep -i '200 ok'disclosure
Exploit-Status
EPSS
0.02% (5% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-53344 is to upgrade Thim Core to version 2.4.0 or later, which includes the necessary fix. If upgrading is not immediately feasible, consider implementing a Content Security Policy (CSP) to restrict the sources from which scripts can be executed. Additionally, ensure that all sensitive actions require explicit user confirmation, such as a password re-entry or a confirmation dialog. Web Application Firewalls (WAFs) can be configured to detect and block malicious CSRF requests, although this is not a substitute for patching the vulnerability.
Actualice el plugin Thim Core a la versión 2.4.0 o superior para mitigar la vulnerabilidad de Cross-Site Request Forgery (CSRF). Asegúrese de realizar una copia de seguridad de su sitio web antes de actualizar cualquier plugin. Consulte la documentación del plugin para obtener instrucciones detalladas sobre cómo actualizar.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-53344 is a Cross-Site Request Forgery (CSRF) vulnerability in ThimPress Thim Core, allowing attackers to perform unauthorized actions if you're using versions before 2.4.0.
You are affected if you are using ThimPress Thim Core versions prior to 2.4.0. Check your plugin version and upgrade if necessary.
Upgrade ThimPress Thim Core to version 2.4.0 or later to resolve the vulnerability. Consider implementing CSP and requiring explicit user confirmation for sensitive actions.
There are currently no confirmed reports of active exploitation, but the vulnerability is publicly known and could be targeted.
Refer to the ThimPress website and plugin documentation for the official advisory and update information regarding CVE-2025-53344.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.