CVE-2025-13408
Description
The Foxtool All-in-One: Contact chat button, Custom login, Media optimize images plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.2. This is due to missing or incorrect nonce validation on the foxtool_login_google() function. This makes it possible for unauthenticated attackers to establish an OAuth Connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Foxtool plugin for WordPress is vulnerable to CSRF in the foxtool_login_google() function, allowing unauthenticated attackers to establish an OAuth connection by tricking a site administrator.
Vulnerability
Analysis The Foxtool All-in-One plugin for WordPress (versions up to and including 2.5.2) contains a Cross-Site Request Forgery (CSRF) vulnerability in the foxtool_login_google() function. This function, which handles Google OAuth login and user creation, lacks proper nonce validation. The vulnerable code is located in /inc/goo.php [1].
Attack
Vector An unauthenticated attacker can exploit this by crafting a malicious request to the foxtool_login_google() callback, which processes an authorization code from Google. Because no nonce is checked, the attacker can forge a request that, when triggered by a logged-in site administrator (e.g., via a link click), will establish a new OAuth connection with the attacker's own Google credentials. This allows the attacker to bypass normal authentication flows [1][2].
Impact
If successfully exploited, the attacker can create a new user account on the WordPress site, or modify an existing connection, effectively gaining access to the site. The function uses wp_insert_user() and allows setting a role (defaulting to 'subscriber'), but an administrator might be tricked into granting higher privileges inadvertently [1].
Mitigation
The vendor has released version 2.5.3 which addresses this vulnerability by adding proper nonce validation. Users are strongly advised to update the plugin to the latest version immediately. There is no known workaround for the vulnerable versions [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.5.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.