Cyber Posture

CVE-2025-28876

Medium

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS Score 0.0013 32.8th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-28876 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Skrill Official WordPress plugin for WooCommerce, developed by Skrill_Team. The flaw affects the official-skrill-woocommerce plugin from unknown initial versions through 1.0.66, enabling CSRF attacks on affected installations.

With a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), the vulnerability is exploitable over the network with low attack complexity and no privileges required, though it demands user interaction. An unauthenticated attacker can trick an authenticated user—such as a site administrator—into submitting a forged request via a malicious webpage, potentially leading to low-impact integrity violations like unauthorized changes to plugin configurations or actions.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/official-skrill-woocommerce/vulnerability/wordpress-skrill-official-plugin-1-0-65-cross-site-request-forgery-csrf-vulnerability?_s_id=cve, which covers the CSRF issue in the plugin.

Details

CWE(s)
CWE-352

Affected Products

skrill
skrill
≤ 1.0.67

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CSRF in public-facing WordPress plugin directly enables exploitation of the application for unauthorized actions.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References