Description
Cross-Site Request Forgery (CSRF) vulnerability in Forge12 Interactive GmbH F12-Profiler f12-profiler allows Cross Site Request Forgery.This issue affects F12-Profiler: from n/a through <= 1.3.9.
Published: 2025-02-24
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw that allows an attacker to trick a logged‑in user into submitting unintended requests to the WordPress site. The flaw resides in the F12‑Profiler plugin, which fails to verify a CSRF token on certain actions. An attacker who convinces a site administrator or other privileged user to visit a crafted URL can cause the user to perform state‑changing operations without their knowledge. This can lead to unauthorized changes in the site configuration, content, or plugin data, representing a moderate threat to confidentiality and integrity within the affected system.

Affected Systems

Forge12 Interactive GmbH provides the F12‑Profiler plugin for WordPress. The vulnerability affects all releases from the initial release through version 1.3.9. Users running WordPress with any of these plugin versions are at risk.

Risk and Exploitability

The CVSS score of 5.4 indicates an average severity. The EPSS score of less than 1 % shows that the likelihood of exploitation is low, and the issue is not listed in the CISA KEV catalog. The common attack vector is a user‑initiated request—an attacker can send the crafted URL to an authenticated user via email or embedded link. The flaw is exploitable only when an authenticated user with sufficient privileges visits a malicious page; it does not provide remote code execution or direct access to the server environment. The exploit would rely on the user’s existing session cookie. Because of the low exploitation probability and the availability of an upgrade path, the overall risk is moderate.

Generated by OpenCVE AI on May 1, 2026 at 15:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the F12‑Profiler plugin to at least version 1.4 or later, which removes the CSRF vulnerability.
  • If an upgrade is not immediately possible, disable or remove the F12‑Profiler plugin from the WordPress installation until a patched version is available.
  • Restrict the plugin’s permissions by configuring the WordPress role settings to limit which user roles can activate or use the plugin, reducing the attack surface.

Generated by OpenCVE AI on May 1, 2026 at 15:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4313 Cross-Site Request Forgery (CSRF) vulnerability in Marc F12-Profiler allows Cross Site Request Forgery. This issue affects F12-Profiler: from n/a through 1.3.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Marc F12-Profiler allows Cross Site Request Forgery. This issue affects F12-Profiler: from n/a through 1.3.9. Cross-Site Request Forgery (CSRF) vulnerability in Forge12 Interactive GmbH F12-Profiler f12-profiler allows Cross Site Request Forgery.This issue affects F12-Profiler: from n/a through <= 1.3.9.
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Mon, 24 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Marc F12-Profiler allows Cross Site Request Forgery. This issue affects F12-Profiler: from n/a through 1.3.9.
Title WordPress F12-Profiler Plugin <= 1.3.9 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:48.770Z

Reserved: 2025-02-21T16:45:54.608Z

Link: CVE-2025-27340

cve-icon Vulnrichment

Updated: 2025-02-24T15:26:21.869Z

cve-icon NVD

Status : Deferred

Published: 2025-02-24T15:15:19.567

Modified: 2026-04-23T15:26:24.280

Link: CVE-2025-27340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T15:45:16Z

Weaknesses