VYPR
Medium severity4.3NVD Advisory· Published Nov 27, 2025· Updated Apr 15, 2026

CVE-2025-12578

CVE-2025-12578

Description

The Reuters Direct plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.0. This is due to missing or incorrect nonce validation on the the 'class-reuters-direct-settings.php' page. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Reuters Direct WordPress plugin (≤3.0.0) is vulnerable to CSRF allowing unauthenticated attackers to reset settings via a forged request.

The Reuters Direct plugin for WordPress, in all versions up to and including 3.0.0, is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists because the 'class-reuters-direct-settings.php' page lacks proper nonce validation, making it possible for an attacker to craft a malicious request that resets the plugin's settings when a site administrator unknowingly triggers it. [1]

To exploit this vulnerability, an unauthenticated attacker must trick a logged-in administrator into performing an action, such as clicking on a crafted link. No authentication is required from the attacker, but the victim must have administrative privileges on the WordPress site. The attack can be delivered via email, social media, or other means of directing the admin to the malicious link. [1]

Successful exploitation allows the attacker to reset the plugin's settings without authorization. This could disrupt the functionality of the plugin or revert configurations, potentially affecting content display or other site features dependent on the plugin. The impact is limited to settings reset and does not include direct data compromise or privilege escalation. [1]

As of November 25, 2025, the plugin has been closed and is no longer available for download due to this security issue. Users are advised to remove the plugin from their WordPress installations and seek alternative solutions. No patch is available as the plugin has been discontinued. [1]

References
  1. Reuters Direct

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.