Description
Cross-Site Request Forgery (CSRF) vulnerability in Zoho Flow Zoho Flow zoho-flow allows Cross Site Request Forgery.This issue affects Zoho Flow: from n/a through <= 2.14.1.
Published: 2025-09-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a Cross‑Site Request Forgery flaw that enables an attacker to cause a victim’s browser, while authenticated to the Zoho Flow WordPress plugin, to submit requests that the plugin accepts. By carrying out such malicious requests, an attacker could perform any action that the authenticated user can, potentially exposing or modifying data the user has access to. The weakness is identified as CWE‑352 and does not provide a direct path to execute arbitrary code or gain system‑level privileges.

Affected Systems

The flaw affects the Zoho Flow WordPress plugin versions up to and including 2.14.1. Hosts running this plugin should check for installed versions and consider updating if they contain this or earlier releases.

Risk and Exploitability

The CVSS v3 base score of 4.3 indicates moderate overall risk, and the EPSS score is reported as less than 1 %, showing a very low probability of real‑world exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would typically attempt to exploit this flaw by tricking a logged‑in user into visiting a crafted link that submits a request to the site; because of the low exploitation rates and lack of privilege escalation, the threat is considered limited but still noteworthy for organizations that rely on the plugin for critical workflows.

Generated by OpenCVE AI on April 30, 2026 at 06:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Zoho Flow WordPress plugin to a version newer than 2.14.1.
  • If upgrading immediately is not possible, disable the plugin for non‑administrative users or remove it from the site until the fix is applied.
  • Configure your web application firewall or host‑level CSRF protection to validate tokens on all requests to the plugin’s endpoints.

Generated by OpenCVE AI on April 30, 2026 at 06:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-30500 Cross-Site Request Forgery (CSRF) vulnerability in Zoho Flow Zoho Flow allows Cross Site Request Forgery. This issue affects Zoho Flow: from n/a through 2.14.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Zoho Flow Zoho Flow allows Cross Site Request Forgery. This issue affects Zoho Flow: from n/a through 2.14.1. Cross-Site Request Forgery (CSRF) vulnerability in Zoho Flow Zoho Flow zoho-flow allows Cross Site Request Forgery.This issue affects Zoho Flow: from n/a through <= 2.14.1.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 23 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 22 Sep 2025 18:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Zoho Flow Zoho Flow allows Cross Site Request Forgery. This issue affects Zoho Flow: from n/a through 2.14.1.
Title WordPress Zoho Flow Plugin <= 2.14.1 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:52.743Z

Reserved: 2025-09-17T18:00:53.705Z

Link: CVE-2025-59568

cve-icon Vulnrichment

Updated: 2025-09-23T17:48:06.769Z

cve-icon NVD

Status : Deferred

Published: 2025-09-22T19:16:24.970

Modified: 2026-04-23T15:34:04.510

Link: CVE-2025-59568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T06:15:29Z

Weaknesses