VYPR
Medium severity4.3NVD Advisory· Published Jun 20, 2025· Updated Apr 23, 2026

CVE-2025-49964

CVE-2025-49964

Description

Cross-Site Request Forgery (CSRF) vulnerability in indgeek ClipLink cliplink allows Cross Site Request Forgery.This issue affects ClipLink: from n/a through <= 1.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in ClipLink WordPress plugin up to 1.1 lets attackers force privileged users into unwanted actions without authentication.

The ClipLink plugin for WordPress, up to version 1.1, contains a Cross-Site Request Forgery (CSRF) vulnerability. This lack of CSRF token validation allows an attacker to craft requests that, when triggered by a privileged user (like an administrator), perform unintended actions on their behalf [1].

Exploitation requires user interaction—an admin must click a malicious link or visit a crafted page while authenticated. No authentication is needed for the attacker, only for the victim user whose session is abused. The vulnerability is classified under CSRF and has a CVSS score of 4.3 (Medium) [1].

A successful CSRF attack can force the victim to change settings, modify content, or perform other admin-level operations without their consent. This type of vulnerability is frequently targeted in mass-exploit campaigns across thousands of sites [1].

The vendor has not released a patch, but immediate action is recommended: update the plugin if a fix becomes available, or contact a hosting provider for assistance. As of the advisory, no workaround is provided beyond restricting access to the vulnerable functionality [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.