CVE-2025-12879
WordPress · WordPress User Generator and Importer plugin
A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in the User Generator and Importer plugin for WordPress.
Executive summary
A high-severity Cross-Site Request Forgery (CSRF) vulnerability has been identified in the User Generator and Importer plugin for WordPress. This flaw could allow an attacker to trick a logged-in administrator into unknowingly performing administrative actions, such as creating new user accounts. Successful exploitation could lead to a full compromise of the affected WordPress site.
Vulnerability
The vulnerability exists because the plugin fails to implement proper security checks (such as nonces) to verify that actions are performed intentionally by the authenticated user. An attacker can exploit this by crafting a malicious webpage or link and tricking an authenticated WordPress administrator into visiting it. When the administrator's browser accesses the malicious link, it automatically includes their session cookies, causing the vulnerable plugin to execute commands—such as creating a new user with administrative privileges—on behalf of the attacker without the administrator's consent or knowledge.
Business impact
This is a High severity vulnerability with a CVSS score of 8.8. A successful exploit could have a significant business impact, including the creation of unauthorized administrative accounts, leading to a complete site takeover. Potential consequences include theft of sensitive user data, website defacement, distribution of malware to site visitors, and severe reputational damage. The compromised website could also be used as a platform for further attacks against other systems, creating additional liability and risk for the organization.
Remediation
Immediate Action:
- Immediately update the "User Generator and Importer" plugin to the latest patched version provided by the developer.
- If the plugin is not actively used or essential for business operations, the recommended course of action is to deactivate and completely remove it from the WordPress installation to eliminate this attack vector.
- Review all existing user accounts, especially those with administrative privileges, to ensure no unauthorized accounts have been created.
Proactive Monitoring:
- Monitor web server and WordPress audit logs for unusual or unexpected administrative activities, particularly user creation, deletion, or privilege modification events originating from unknown or suspicious referrers.
- Implement alerts for the creation of new administrative-level user accounts.
- Regularly audit the list of installed plugins and themes to ensure they are all up-to-date and actively maintained.
Compensating Controls:
- If immediate patching is not possible, deploy a Web Application Firewall (WAF) with rules designed to detect and block CSRF attacks.
- Enforce a policy requiring administrators to log out of their WordPress sessions when not in use to minimize the window of opportunity for an attacker.
- Restrict access to the WordPress administrative dashboard (
/wp-admin/) to trusted IP addresses only.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the potential for a full site compromise, immediate action is required. We strongly recommend that all organizations using the affected plugin apply the vendor-supplied patches or remove the plugin without delay. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants treating it as a critical threat. Prioritize patching this vulnerability to prevent unauthorized access and protect the integrity of your web assets.