MEDIUMCVE-2025-13362CVSS 4.3

Norby AI <= 1.0.3 - Cross-Site Request Forgery para Actualización de Configuración

Plataforma

wordpress

Componente

norby-ai

Corregido en

1.0.4

AI Confidence: highNVDEPSS 0.0%Revisado: may 2026
Traduciendo a tu idioma…

CVE-2025-13362 describes a Cross-Site Request Forgery (CSRF) vulnerability affecting the Norby AI plugin for WordPress. This flaw allows unauthenticated attackers to manipulate the plugin's settings, potentially injecting malicious web scripts. The vulnerability impacts versions 1.0.0 through 1.0.3 and can be mitigated by upgrading to a patched version of the plugin.

WordPress

Detecta esta CVE en tu proyecto

Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.

Impacto y Escenarios de Ataquetraduciendo…

The primary impact of this CSRF vulnerability is the ability for an attacker to modify the Norby AI plugin's configuration without authentication. By crafting a malicious request and tricking a site administrator into clicking a link or visiting a compromised page, an attacker can alter plugin settings. This could involve injecting arbitrary JavaScript code, potentially leading to account takeover, data theft, or defacement of the WordPress site. The blast radius extends to any site utilizing the vulnerable Norby AI plugin, particularly those with administrative access that could be socially engineered into executing the malicious request.

Contexto de Explotacióntraduciendo…

CVE-2025-13362 was publicly disclosed on December 5, 2025. There are currently no known public proof-of-concept exploits available. The vulnerability is not listed on the CISA KEV catalog as of this date. Given the relatively straightforward nature of CSRF exploitation and the plugin's popularity, it is reasonable to expect that public exploits may emerge in the future.

Quién Está en Riesgotraduciendo…

WordPress sites utilizing the Norby AI plugin, particularly those with shared hosting environments where multiple users may have access to the same WordPress installation. Sites with less stringent security practices or those that do not regularly update their plugins are also at increased risk.

Pasos de Deteccióntraduciendo…

• wordpress / composer / npm:

grep -r 'settings_update' /var/www/html/wp-content/plugins/norby-ai/

• wordpress / composer / npm:

wp plugin list --status=all | grep norby-ai

• generic web: Check for unusual plugin settings changes in the WordPress admin panel. • generic web: Review WordPress access logs for suspicious requests targeting the plugin's settings endpoint.

Cronología del Ataque

  1. Disclosure

    disclosure

Inteligencia de Amenazas

Estado del Exploit

Prueba de ConceptoDesconocido
CISA KEVNO
Exposición en InternetAlta

EPSS

0.02% (3% percentil)

CISA SSVC

Explotaciónnone
Automatizableno
Impacto Técnicopartial

Vector CVSS

INTELIGENCIA DE AMENAZAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N4.3MEDIUMAttack VectorNetworkCómo el atacante alcanza el objetivoAttack ComplexityLowCondiciones necesarias para explotarPrivileges RequiredNoneNivel de autenticación requeridoUser InteractionRequiredSi la víctima debe realizar una acciónScopeUnchangedImpacto más allá del componente afectadoConfidentialityNoneRiesgo de exposición de datos sensiblesIntegrityLowRiesgo de modificación no autorizada de datosAvailabilityNoneRiesgo de interrupción del servicionextguardhq.com · Puntuación Base CVSS v3.1
¿Qué significan estas métricas?
Attack Vector
Red — explotable remotamente por internet. Sin acceso físico ni local. Mayor superficie de ataque.
Attack Complexity
Baja — sin condiciones especiales. El atacante puede explotar de forma confiable sin configuraciones raras.
Privileges Required
Ninguno — sin autenticación. No se necesitan credenciales para explotar.
User Interaction
Requerida — la víctima debe abrir un archivo, hacer clic en un enlace o visitar una página.
Scope
Sin cambio — el impacto se limita al componente vulnerable.
Confidentiality
Ninguno — sin impacto en confidencialidad.
Integrity
Bajo — el atacante puede modificar algunos datos con alcance limitado.
Availability
Ninguno — sin impacto en disponibilidad.

Software Afectado

Componentenorby-ai
Proveedorwordfence
Rango afectadoCorregido en
0 – 1.0.31.0.4

Clasificación de Debilidad (CWE)

Cronología

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS actualizado
Sin parche — 170 días desde la divulgación

Mitigación y Workaroundstraduciendo…

The recommended mitigation is to immediately upgrade the Norby AI plugin to a version that addresses this CSRF vulnerability. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a temporary workaround by restricting access to the plugin's settings page. This can be achieved through role-based access control (RBAC) plugins or custom code that limits access to authorized administrators only. While not a complete solution, this can reduce the attack surface. After upgrading, verify the fix by attempting to access the plugin's settings page from a different browser session without being logged in as an administrator; the page should redirect or display an access denied error.

Cómo corregirlo

No hay parche conocido disponible. Por favor, revise los detalles de la vulnerabilidad en profundidad y emplee mitigaciones basadas en la tolerancia al riesgo de su organización. Puede ser mejor desinstalar el software afectado y buscar un reemplazo.

Boletín de seguridad CVE

Análisis de vulnerabilidades y alertas críticas directamente en tu correo.

Preguntas frecuentestraduciendo…

What is CVE-2025-13362 — CSRF in Norby AI WordPress Plugin?

CVE-2025-13362 is a Cross-Site Request Forgery (CSRF) vulnerability in the Norby AI WordPress plugin versions 1.0.0–1.0.3, allowing attackers to modify plugin settings via forged requests.

Am I affected by CVE-2025-13362 in Norby AI WordPress Plugin?

You are affected if your WordPress site uses the Norby AI plugin in versions 1.0.0 through 1.0.3. Upgrade to a patched version to resolve the vulnerability.

How do I fix CVE-2025-13362 in Norby AI WordPress Plugin?

The primary fix is to upgrade the Norby AI plugin to a version that addresses the CSRF vulnerability. As a temporary workaround, restrict access to the plugin's settings page.

Is CVE-2025-13362 being actively exploited?

As of December 5, 2025, there are no confirmed reports of active exploitation, but the vulnerability is considered potentially exploitable.

Where can I find the official Norby AI advisory for CVE-2025-13362?

Refer to the Norby AI plugin's official website or WordPress plugin repository for the latest advisory and update information.

¿Tu proyecto está afectado?

Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.