VYPR
Medium severity5.4NVD Advisory· Published May 7, 2025· Updated Apr 23, 2026

CVE-2025-47684

CVE-2025-47684

Description

Cross-Site Request Forgery (CSRF) vulnerability in Smaily Smaily for WP smaily-for-wp allows Cross Site Request Forgery.This issue affects Smaily for WP: from n/a through <= 3.1.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Smaily for WP plugin (≤3.1.7) allows attackers to force privileged users to perform unintended actions.

Vulnerability

Overview

CVE-2025-47684 is a Cross-Site Request Forgery (CSRF) vulnerability in the Smaily for WP plugin for WordPress, affecting versions from n/a through 3.1.7. The flaw exists because the plugin does not properly validate or enforce anti-CSRF tokens on sensitive actions, allowing an attacker to craft malicious requests that can be executed by an authenticated administrator.

Exploitation

Details

Exploitation requires user interaction: a privileged user (such as an administrator) must be tricked into clicking a malicious link, visiting a crafted page, or submitting a form while logged into the WordPress admin panel. No authentication is needed for the attacker, but the victim must have an active session with sufficient privileges. This type of vulnerability is commonly used in mass-exploit campaigns targeting thousands of sites simultaneously [1].

Impact

Successful exploitation allows an attacker to force the victim to perform unintended actions under their current authentication, such as changing plugin settings, adding or deleting users, or modifying site content. The CVSS v3 base score is 5.4 (Medium), reflecting the need for user interaction and the potential for significant but limited impact.

Mitigation

The vendor has not released a specific patch version, but users are strongly advised to update the Smaily for WP plugin to the latest available version as soon as possible. If updating is not immediately feasible, site administrators should implement additional security measures such as using a web application firewall or restricting access to the plugin's settings pages [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.