VYPR
Medium severity5.4NVD Advisory· Published Jan 24, 2025· Updated Apr 23, 2026

CVE-2025-24714

CVE-2025-24714

Description

Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Bubble Menu – circle floating menu bubble-menu allows Cross Site Request Forgery.This issue affects Bubble Menu – circle floating menu: from n/a through <= 4.0.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Bubble Menu plugin (<=4.0.2) allows an attacker to force privileged users into executing unwanted actions.

The Bubble Menu – circle floating menu WordPress plugin, versions up to and including 4.0.2, contains a Cross-Site Request Forgery (CSRF) vulnerability [1]. This stems from insufficient request validation, allowing a malicious actor to trick an authenticated user with higher privileges into performing unintended actions on their behalf. The vulnerability does not require direct authentication but relies on user interaction to succeed.

A successful CSRF attack involves an attacker crafting a malicious link or form that, when visited or submitted by an authenticated administrator or editor, performs state-changing operations in the plugin's context [1]. The prerequisite is that the victim must have an active session in the WordPress dashboard. The attack does not require any special network position; it can be delivered via email, social engineering, or by embedding the malicious payload on a compromised website.

The impact is that an attacker can force privileged users to change plugin settings, modify configurations, or execute other actions under their authentication [1]. While the CVSS score of 5.4 indicates medium severity, such vulnerabilities are commonly used in mass-exploit campaigns targeting thousands of sites regardless of popularity.

The vendor has released version 4.0.3 which patches the CSRF vulnerability [1]. Users are advised to update immediately. For those who cannot update, contacting the hosting provider or a web developer is recommended. Patchstack users can enable auto-updates for vulnerable plugins.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.