VYPR
Medium severity6.1NVD Advisory· Published May 3, 2025· Updated Apr 15, 2026

CVE-2025-4199

CVE-2025-4199

Description

The Abundatrade Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.02. This is due to missing or incorrect nonce validation on the 'abundatrade' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Abundatrade Plugin for WordPress is vulnerable to CSRF (CVSS 6.1) allowing unauthenticated attackers to change settings and inject scripts by tricking an admin.

Root

Cause The Abundatrade Plugin for WordPress, up to version 1.8.02, suffers from a Cross-Site Request Forgery (CSRF) vulnerability on the 'abundatrade' page. The plugin fails to validate or properly implement a nonce for certain requests, which is the standard WordPress mechanism for ensuring that requests originate from the legitimate user session [1].

Exploitation

An unauthenticated attacker can exploit this flaw by crafting a malicious link or request that performs actions on the vulnerable plugin's admin page. To succeed, the attacker must trick a logged-in site administrator into clicking the link or performing an action that triggers the forged request. No authentication is required for the attacker, making the attack vector accessible from the public internet [1].

Impact

Successful CSRF exploitation allows the attacker to update plugin settings and inject arbitrary malicious web scripts. This can lead to stored or reflected cross-site scripting (XSS), which may then be used to compromise the administrator's session, deface the site, or perform other malicious actions within the WordPress dashboard context [1].

Mitigation

The Abundatrade Plugin has been closed on the WordPress plugin repository as of May 1, 2025, due to this security issue. It is no longer available for download. Users who have the plugin installed should remove it immediately or ensure a patched version is applied if one becomes available, as no update is currently provided [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.