Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-352 (跨站请求伪造(CSRF)) — Vulnerability Class 4797

4797 vulnerabilities classified as CWE-352 (跨站请求伪造(CSRF)). AI Chinese analysis included.

CWE-352, Cross-Site Request Forgery, is a web application weakness where the system fails to verify that an incoming request was intentionally initiated by the authenticated user rather than an unauthorized actor. Attackers typically exploit this vulnerability by tricking a victim into submitting a malicious request, often via a hidden link or form on a third-party site, while the victim is logged into the target application. Because the browser automatically includes valid session cookies, the server processes the forged request as legitimate, potentially allowing unauthorized actions like fund transfers or profile changes. Developers mitigate this risk by implementing anti-CSRF tokens, synchronizer tokens, or validating the Origin and Referer headers to ensure requests originate from trusted sources, thereby preventing unauthorized state changes.

MITRE CWE Description
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Common Consequences (1)
Confidentiality, Integrity, Availability, Non-Repudiation, Access ControlGain Privileges or Assume Identity, Bypass Protection Mechanism, Read Application Data, Modify Application Data, DoS: Crash, Exit, or Restart
The consequences will vary depending on the nature of the functionality that is vulnerable to CSRF. An attacker could trick a client into making an unintentional request to the web server via a URL, image load, XMLHttpRequest, etc., which would then be treated as an authentic request from the client…
Mitigations (5)
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. For example, use anti-CSRF packages such as the OWASP CSRFGuard. [REF-330] Another example is the ESAPI Session Management control, which includes a component for CSRF. [REF-45]
ImplementationEnsure that the application is free of cross-site scripting issues (CWE-79), because most CSRF defenses can be bypassed using attacker-controlled script.
Architecture and DesignGenerate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330). [REF-332]
Architecture and DesignIdentify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation.
Architecture and DesignUse the "double-submitted cookie" method as described by Felten and Zeller: When a user visits a site, the site should generate a pseudorandom value and set it as a cookie on the user's machine. The site should require every form submission to include this value as a form value and also as a cookie value. When a POST request is sent to the site, the request should only be considered valid if the f…
Examples (1)
This example PHP code attempts to secure the form submission process by validating that the user submitting the form has a valid session. A CSRF attack would not be prevented by this countermeasure because the attacker forges a request through the user's web browser in which a valid session already exists.
<form action="/url/profile.php" method="post"> <input type="text" name="firstname"/> <input type="text" name="lastname"/> <br/> <input type="text" name="email"/> <input type="submit" name="submit" value="Update"/> </form>
Bad · HTML
// initiate the session in order to validate sessions session_start(); //if the session is registered to a valid user then allow update if (! session_is_registered("username")) { echo "invalid session detected!"; // Redirect user to login page [...] exit; } // The user session is valid, so process the request // and update the information update_profile(); function update_profile { // read in the data from $POST and send an update // to the database SendUpdateToDatabase($_SESSION['username'], $_POST['email']); [...] echo "Your profile has been successfully updated."; }
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2025-31033 WordPress Buddypress Humanity plugin <= 1.2 - CSRF to Privilege Escalation vulnerability — Buddypress Humanity 9.8 Critical2025-04-09
CVE-2025-31034 WordPress Customize Login Page plugin <= 1.1 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability — Customize Login Page 4.3 Medium2025-04-09
CVE-2025-31038 WordPress Essential Breadcrumbs plugin <= 1.1.1 - CSRF to Privilege Escalation vulnerability — Essential Breadcrumbs 8.8 High2025-04-09
CVE-2025-31036 WordPress WPSolr plugin <= 24.0 - CSRF to Privilege Escalation vulnerability — WPSolr 8.8 High2025-04-09
CVE-2025-31375 WordPress Scheduled plugin <= 1.0 - CSRF to Stored XSS vulnerability — Scheduled 7.1 High2025-04-09
CVE-2025-31382 WordPress Language Field plugin <= 0.9 - CSRF to Stored XSS vulnerability — Language Field 7.1 High2025-04-09
CVE-2025-31388 WordPress The World plugin <= 0.4 - CSRF to Stored XSS vulnerability — The World 7.1 High2025-04-09
CVE-2025-31390 WordPress Social Crowd plugin <= 0.9.6.1 - CSRF to Stored XSS vulnerability — Social Crowd 7.1 High2025-04-09
CVE-2025-31391 WordPress Script Compressor plugin <= 1.7.1 - CSRF to Stored XSS vulnerability — Script Compressor 7.1 High2025-04-09
CVE-2025-31392 WordPress Smart Product Gallery Slider plugin <= 1.0.4 - CSRF to Stored XSS vulnerability — Smart Product Gallery Slider 7.1 High2025-04-09
CVE-2025-31393 WordPress Social Bookmarking RELOADED plugin <= 3.18 - CSRF to Stored XSS vulnerability — Social Bookmarking RELOADED 7.1 High2025-04-09
CVE-2025-31395 WordPress Easy Custom CSS plugin <= 1.0 - CSRF to Stored XSS vulnerability — Easy Custom CSS 7.1 High2025-04-09
CVE-2025-31399 WordPress CG Scroll To Top plugin <= 3.5 - CSRF to Stored XSS vulnerability — CG Scroll To Top 7.1 High2025-04-09
CVE-2025-31400 WordPress WS Audio Player plugin <= 1.1.8 - CSRF to Stored XSS vulnerability — WS Audio Player 7.1 High2025-04-09
CVE-2025-31401 WordPress MMX – Make Me Christmas plugin <= 1.0.0 - CSRF to Stored XSS vulnerability — MMX – Make Me Christmas 7.1 High2025-04-09
CVE-2025-31402 WordPress NewsBoard Post and RSS Scroller plugin <= 1.2.12 - CSRF to Stored XSS vulnerability — NewsBoard Post and RSS Scroller 7.1 High2025-04-09
CVE-2025-31404 WordPress AF Tell a Friend plugin <= 1.4 - CSRF to Stored XSS vulnerability — AF Tell a Friend 7.1 High2025-04-09
CVE-2025-32476 WordPress Advanced Tag Lists plugin <= 1.2 - CSRF to Stored XSS vulnerability — Advanced Tag Lists 7.1 High2025-04-09
CVE-2025-32477 WordPress WP-Easy Menu plugin <= 0.41 - CSRF to Stored XSS vulnerability — WP-Easy Menu 7.1 High2025-04-09
CVE-2025-32478 WordPress WP SexyLightBox plugin <= 0.5.3 - CSRF to Stored XSS vulnerability — WP SexyLightBox 7.1 High2025-04-09
CVE-2025-32479 WordPress Flags Widget plugin <= 1.0.7 - CSRF to Stored XSS vulnerability — Flags Widget 7.1 High2025-04-09
CVE-2025-32480 WordPress Windows Live Writer plugin <= 0.1 - CSRF to Stored XSS vulnerability — Windows Live Writer 7.1 High2025-04-09
CVE-2025-32481 WordPress Nino Social Connect plugin <= 2.0 - CSRF to Stored XSS vulnerability — Nino Social Connect 7.1 High2025-04-09
CVE-2025-32482 WordPress Custom Smilies plugin <= 1.2 - CSRF to Stored XSS vulnerability — Custom Smilies 7.1 High2025-04-09
CVE-2025-32484 WordPress WP-Planification – WP-Planning plugin <= 2.3.1 - CSRF to Stored XSS vulnerability — WP-Planification 7.1 High2025-04-09
CVE-2025-32485 WordPress WP Performance Pack plugin <= 2.5.4 - Cross Site Request Forgery (CSRF) Vulnerability — WP Performance Pack 4.3 Medium2025-04-09
CVE-2025-32494 WordPress reCAPTCHA Jetpack plugin <= 0.2.2 - Cross Site Request Forgery (CSRF) Vulnerability — reCAPTCHA Jetpack 4.3 Medium2025-04-09
CVE-2025-32497 WordPress Spoiler Block plugin <= 1.7 - CSRF to Stored XSS vulnerability — Spoiler Block 7.1 High2025-04-09
CVE-2025-32496 WordPress Ultra Demo Importer plugin <= 1.0.5 - CSRF to RCE vulnerability — Ultra Demo Importer 9.6 Critical2025-04-09
CVE-2025-32498 WordPress VKontakte Cross-Post plugin <= 0.3.2 - CSRF to Stored XSS vulnerability — VKontakte Cross-Post 7.1 High2025-04-09

Vulnerabilities classified as CWE-352 (跨站请求伪造(CSRF)) represent 4797 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.