VYPR
Medium severity5.4NVD Advisory· Published Sep 5, 2025· Updated Apr 23, 2026

CVE-2025-58801

CVE-2025-58801

Description

Cross-Site Request Forgery (CSRF) vulnerability in KCS Responder responder allows Cross Site Request Forgery.This issue affects Responder: from n/a through <= 4.3.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in the WordPress Responder plugin (up to 4.3.8) allows attackers to force privileged users into executing unintended actions.

A Cross-Site Request Forgery (CSRF) vulnerability exists in the KCS Responder plugin for WordPress, affecting versions from n/a through 4.3.8. The plugin fails to validate or tokenize requests on certain endpoints, allowing an attacker to craft malicious requests that appear legitimate to an authenticated user's browser. This is a classic CSRF flaw rooted in missing anti-forgery protections [1].

To exploit this vulnerability, an attacker must trick a privileged user — such as an administrator or editor — into clicking a malicious link, visiting a crafted page, or submitting a specially prepared form. No direct authentication is needed for the attacker, but the victim must be logged into the WordPress site. The attack is typically delivered via phishing or social engineering, and requires user interaction from the victim [1].

Successful exploitation enables the attacker to force the higher-privileged user to execute unwanted actions under their current authenticated session. For example, an attacker could change plugin settings, create or delete administrative accounts, or modify site content, depending on the victim's permissions. The CVSS score of 5.4 reflects the medium severity, noting that while exploitation requires user interaction, the impact on confidentiality, integrity, and availability can be noticeable [1].

The vulnerability has been addressed in version 4.4.0 of the Responder plugin. Users are strongly advised to update to this version or later immediately. For Patchstack users, enabling auto-updates for vulnerable plugins is a recommended mitigation. As a temporary workaround, users should avoid clicking links from untrusted sources while logged into the WordPress admin panel [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.