Cyber Posture

CVE-2025-28863

Medium

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS Score 0.0016 36.9th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user clicking a malicious link in order to gain execution.

Security Summary

CVE-2025-28863 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the WordPress plugin Delete Original Image developed by Carlos Minatti. The flaw affects all versions of the plugin up to and including 0.4, enabling attackers to perform forged requests on behalf of authenticated users. It received a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), indicating medium severity with network accessibility, low attack complexity, no privileges required, and user interaction needed.

An attacker can exploit this vulnerability by tricking an authenticated WordPress user, such as an administrator, into visiting a malicious webpage that submits a forged request to the plugin's delete function. No attacker authentication is required, but the victim must have sufficient privileges to trigger the action. Successful exploitation results in low integrity impact, potentially allowing unauthorized deletion of original images without the user's knowledge or consent.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/delete-original-image/vulnerability/wordpress-delete-original-image-plugin-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve details the vulnerability and recommends updating to a patched version of the plugin where available, or disabling it if no patch exists. Security practitioners should verify plugin updates via official WordPress repositories and implement CSRF tokens in custom workflows as a general mitigation.

Details

CWE(s)
CWE-352

Affected Products

carlosminatti
delete original image
≤ 0.4

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

CSRF vuln in public-facing WordPress plugin exploited by tricking authenticated user to visit malicious webpage (T1190 for public-facing app exploitation; T1204.001 for malicious link delivery requiring user interaction).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References