CVE-2025-13362 describes a Cross-Site Request Forgery (CSRF) vulnerability affecting the Norby AI plugin for WordPress. This flaw allows unauthenticated attackers to manipulate the plugin's settings, potentially injecting malicious web scripts. The vulnerability impacts versions 1.0.0 through 1.0.3 and can be mitigated by upgrading to a patched version of the plugin.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
影响与攻击场景翻译中…
The primary impact of this CSRF vulnerability is the ability for an attacker to modify the Norby AI plugin's configuration without authentication. By crafting a malicious request and tricking a site administrator into clicking a link or visiting a compromised page, an attacker can alter plugin settings. This could involve injecting arbitrary JavaScript code, potentially leading to account takeover, data theft, or defacement of the WordPress site. The blast radius extends to any site utilizing the vulnerable Norby AI plugin, particularly those with administrative access that could be socially engineered into executing the malicious request.
利用背景翻译中…
CVE-2025-13362 was publicly disclosed on December 5, 2025. There are currently no known public proof-of-concept exploits available. The vulnerability is not listed on the CISA KEV catalog as of this date. Given the relatively straightforward nature of CSRF exploitation and the plugin's popularity, it is reasonable to expect that public exploits may emerge in the future.
哪些人处于风险中翻译中…
WordPress sites utilizing the Norby AI plugin, particularly those with shared hosting environments where multiple users may have access to the same WordPress installation. Sites with less stringent security practices or those that do not regularly update their plugins are also at increased risk.
检测步骤翻译中…
• wordpress / composer / npm:
grep -r 'settings_update' /var/www/html/wp-content/plugins/norby-ai/• wordpress / composer / npm:
wp plugin list --status=all | grep norby-ai• generic web: Check for unusual plugin settings changes in the WordPress admin panel. • generic web: Review WordPress access logs for suspicious requests targeting the plugin's settings endpoint.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.02% (3% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 需要 — 受害者必须打开文件、点击链接或访问特制页面。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 无 — 无机密性影响。
- Integrity
- 低 — 攻击者可修改部分数据,影响有限。
- Availability
- 无 — 无可用性影响。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The recommended mitigation is to immediately upgrade the Norby AI plugin to a version that addresses this CSRF vulnerability. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a temporary workaround by restricting access to the plugin's settings page. This can be achieved through role-based access control (RBAC) plugins or custom code that limits access to authorized administrators only. While not a complete solution, this can reduce the attack surface. After upgrading, verify the fix by attempting to access the plugin's settings page from a different browser session without being logged in as an administrator; the page should redirect or display an access denied error.
修复方法
没有已知的补丁可用。请深入审查漏洞的详细信息,并根据您组织的风险承受能力采取缓解措施。最好卸载受影响的软件并寻找替代方案。
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2025-13362 — CSRF in Norby AI WordPress Plugin?
CVE-2025-13362 is a Cross-Site Request Forgery (CSRF) vulnerability in the Norby AI WordPress plugin versions 1.0.0–1.0.3, allowing attackers to modify plugin settings via forged requests.
Am I affected by CVE-2025-13362 in Norby AI WordPress Plugin?
You are affected if your WordPress site uses the Norby AI plugin in versions 1.0.0 through 1.0.3. Upgrade to a patched version to resolve the vulnerability.
How do I fix CVE-2025-13362 in Norby AI WordPress Plugin?
The primary fix is to upgrade the Norby AI plugin to a version that addresses the CSRF vulnerability. As a temporary workaround, restrict access to the plugin's settings page.
Is CVE-2025-13362 being actively exploited?
As of December 5, 2025, there are no confirmed reports of active exploitation, but the vulnerability is considered potentially exploitable.
Where can I find the official Norby AI advisory for CVE-2025-13362?
Refer to the Norby AI plugin's official website or WordPress plugin repository for the latest advisory and update information.