CVE-2025-14390
WordPress · WordPress Video Merchant plugin
A high-severity vulnerability has been identified in the Video Merchant plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the Video Merchant plugin for WordPress. This flaw, a Cross-Site Request Forgery (CSRF), could allow an attacker to trick a logged-in administrator into unknowingly performing sensitive actions, potentially leading to a full website compromise, data modification, or the injection of malicious content. Immediate patching is recommended to mitigate the significant risk to site integrity and security.
Vulnerability
The vulnerability is a Cross-Site Request Forgery (CSRF) due to a lack of security nonces or other validation checks on administrative functions within the plugin. An attacker can craft a malicious link, form, or script and deliver it to a site administrator via email or a compromised website. If the administrator, while logged into their WordPress session, interacts with the malicious content, their browser will automatically execute a request to the vulnerable site, performing actions on behalf of the administrator without their consent or knowledge.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a severe business impact by allowing an attacker to take control of the website's administrative functions. Potential consequences include website defacement, unauthorized content modification, theft of sensitive user data, installation of backdoors, or redirection of users to malicious sites. These actions can lead to significant reputational damage, loss of customer trust, and potential regulatory fines depending on the data compromised.
Remediation
Immediate Action:
- Immediately update the Video Merchant plugin to the latest patched version available in the WordPress plugin repository.
- If the plugin is no longer essential for business operations, the recommended course of action is to deactivate and completely remove it to eliminate this attack vector.
- Review all WordPress user accounts, especially those with administrative privileges, for any unauthorized changes or additions.
Proactive Monitoring:
- Monitor web server access logs for unusual or unexpected POST requests to the plugin's administrative endpoints, particularly from unknown or suspicious referrers.
- Review WordPress audit logs for any unauthorized administrative actions, such as changes to settings, new user creation, or content modification, that coincide with administrator activity.
- Implement file integrity monitoring to detect unauthorized changes to plugin files or the WordPress core.
Compensating Controls:
- If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block CSRF attacks.
- Enforce a strict policy for administrators to log out of their WordPress sessions when not actively managing the site to reduce the window of opportunity for an attack.
- Ensure administrators do not browse other websites or check email in the same browser session where they are logged into the WordPress admin panel.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 8.8) and the potential for a complete site compromise, this vulnerability poses a critical risk. We strongly recommend that all system owners immediately identify WordPress instances running the vulnerable Video Merchant plugin and apply the vendor-supplied update without delay. Although this CVE is not currently listed on the CISA KEV catalog, its critical nature warrants treating it as a top-priority patching requirement to prevent potential exploitation.