Cyber Posture

CVE-2025-28856

Medium

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS Score 0.0016 36.9th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user clicking a malicious link in order to gain execution.

Security Summary

CVE-2025-28856 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in the WordPress plugin W3Counter Free Real-Time Web Stats (blog-stats-by-w3counter) developed by dangrossman. The issue affects the plugin from unknown initial versions through version 4.1 inclusive. Published on 2025-03-11, it carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), indicating medium severity with network accessibility, low attack complexity, no required privileges, and user interaction needed.

Attackers can exploit this vulnerability remotely by tricking authenticated users into visiting a malicious site or clicking a forged link, leading to unauthorized actions on the victim's behalf. No privileges are required on the attacker's part, but exploitation depends on user interaction such as loading a malicious webpage. Successful attacks result in low integrity impact, potentially allowing modification of plugin-related data or settings without affecting confidentiality or availability.

The Patchstack advisory provides details on this vulnerability in the WordPress plugin, including assessment and recommended actions for mitigation. Security practitioners should consult https://patchstack.com/database/Wordpress/Plugin/blog-stats-by-w3counter/vulnerability/wordpress-w3counter-free-real-time-web-stats-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve for patching guidance and verification steps.

Details

CWE(s)
CWE-352

Affected Products

w3counter
w3counter
≤ 4.1

MITRE ATT&CK Enterprise Techniques

T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

CSRF vulnerability requires tricking authenticated users into clicking a forged link or visiting a malicious site to trigger unauthorized actions, directly mapping to user execution via malicious link.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References