LOWCVE-2025-8606CVSS 2.4

GSheetConnector For Gravity Forms <= 1.3.23 - Cross-Site Request Forgery tot Willekeurige Plugin Activering/Deactivering

Platform

wordpress

Component

gsheetconnector-gravity-forms

Opgelost in

1.3.24

AI Confidence: highNVDEPSS 0.0%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

A Cross-Site Request Forgery (CSRF) vulnerability exists in the GSheetConnector for Gravity Forms plugin for WordPress, affecting versions from 1.0.0 through 1.3.23. This flaw allows attackers to trick authenticated administrators into performing actions, such as activating or deactivating plugins, without their knowledge. The vulnerability stems from insufficient nonce validation within the plugin's core functions. A patch, version 1.3.24, has been released to address this issue.

WordPress

Detecteer deze CVE in je project

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

Impact en Aanvalsscenarioswordt vertaald…

The primary impact of this CSRF vulnerability is the potential for unauthorized plugin management. An attacker could craft a malicious link or embed a hidden form on a compromised page, enticing an administrator to click or visit it. Upon interaction, the attacker can trigger actions like activating or deactivating plugins, potentially disrupting website functionality or introducing malicious code. While the CVSS score is low, successful exploitation could lead to significant operational disruptions and potential security compromises if malicious plugins are activated. The attack surface is limited to administrators with access to plugin management features.

Uitbuitingscontextwordt vertaald…

This vulnerability was publicly disclosed on 2025-10-11. No public proof-of-concept (PoC) code has been identified at the time of writing. It is not currently listed on the CISA KEV catalog. The low CVSS score suggests a relatively low probability of exploitation, but the ease of CSRF attacks means vigilance is still required.

Wie Loopt Risicowordt vertaald…

WordPress websites utilizing the GSheetConnector for Gravity Forms plugin, particularly those with administrators who frequently manage plugins or visit external links. Shared hosting environments where plugin updates are managed centrally are also at increased risk, as a compromised account on one site could potentially affect others.

Detectiestappenwordt vertaald…

• wordpress / composer / npm:

grep -r 'activate_plugin|deactivate_plugin' /var/www/html/wp-content/plugins/gsheetconnector-for-gravity-forms/

• wordpress / composer / npm:

wp plugin list --status=active | grep gsheetconnector

• wordpress / composer / npm:

wp plugin update gsheetconnector-for-gravity-forms

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.01% (3% percentiel)

CISA SSVC

Exploitatienone
Automatiseerbaarno
Technische Impactpartial

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N2.4LOWAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredHighVereist authenticatieniveau voor aanvalUser InteractionRequiredOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityNoneRisico op blootstelling van gevoelige dataIntegrityLowRisico op ongeautoriseerde gegevenswijzigingAvailabilityNoneRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Hoog — beheerder of geprivilegieerd account vereist.
User Interaction
Vereist — slachtoffer moet een bestand openen, op een link klikken of een pagina bezoeken.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Geen — geen vertrouwelijkheidsimpact.
Integrity
Laag — aanvaller kan enkele gegevens met beperkte omvang aanpassen.
Availability
Geen — geen beschikbaarheidsimpact.

Getroffen Software

Componentgsheetconnector-gravity-forms
Leverancierwesterndeal
Getroffen bereikOpgelost in
0 – 1.3.231.3.24

Pakketinformatie

Actieve installaties
1KNiche
Plugin-beoordeling
5.0
Vereist WordPress
5.6+
Compatibel tot
7.0
Vereist PHP
7.4+

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt

Mitigatie en Workaroundswordt vertaald…

The recommended mitigation is to immediately upgrade the GSheetConnector for Gravity Forms plugin to version 1.3.24 or later. If upgrading is not immediately feasible due to compatibility concerns or breaking changes, consider implementing a Web Application Firewall (WAF) rule to filter out suspicious requests targeting the activateplugin and deactivateplugin endpoints. Specifically, look for requests lacking proper nonce validation. Additionally, educate administrators about the risks of clicking on untrusted links or visiting unfamiliar websites, as this is a common CSRF attack vector. After upgrading, confirm the fix by attempting to trigger plugin activation/deactivation via a crafted CSRF request; it should be rejected.

Hoe te verhelpenwordt vertaald…

Actualice el plugin GSheetConnector for Gravity Forms a la versión 1.3.24 o superior para mitigar la vulnerabilidad de Cross-Site Request Forgery.  Esta actualización corrige la falta de validación de nonce en las funciones de activación y desactivación de plugins, previniendo que atacantes puedan manipular estas acciones.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2025-8606 — CSRF in GSheetConnector for Gravity Forms?

CVE-2025-8606 is a Cross-Site Request Forgery (CSRF) vulnerability affecting GSheetConnector for Gravity Forms versions 1.0.0–1.3.23, allowing attackers to perform actions as an administrator.

Am I affected by CVE-2025-8606 in GSheetConnector for Gravity Forms?

You are affected if you are using GSheetConnector for Gravity Forms version 1.0.0 through 1.3.23. Upgrade to 1.3.24 or later to mitigate the risk.

How do I fix CVE-2025-8606 in GSheetConnector for Gravity Forms?

Upgrade the GSheetConnector for Gravity Forms plugin to version 1.3.24 or later. Consider WAF rules as a temporary workaround if immediate upgrade is not possible.

Is CVE-2025-8606 being actively exploited?

There is no confirmed active exploitation of CVE-2025-8606 at this time, but the ease of CSRF attacks warrants caution.

Where can I find the official GSheetConnector advisory for CVE-2025-8606?

Refer to the official GSheetConnector for Gravity Forms plugin documentation or their website for the latest advisory and update information.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.