VYPR
Medium severity4.3NVD Advisory· Published Sep 26, 2025· Updated Apr 23, 2026

CVE-2025-58914

CVE-2025-58914

Description

Cross-Site Request Forgery (CSRF) vulnerability in Di Themes Di Themes Demo Site Importer di-themes-demo-site-importer allows Cross Site Request Forgery.This issue affects Di Themes Demo Site Importer: from n/a through <= 1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Di Themes Demo Site Importer plugin for WordPress is vulnerable to CSRF, allowing attackers to force plugin activation by tricking an admin into clicking a malicious link.

Vulnerability

Overview

A Cross-Site Request Forgery (CSRF) vulnerability exists in the Di Themes Demo Site Importer plugin for WordPress, affecting versions up to and including 1.2. The plugin fails to implement proper nonce validation during plugin activation requests, enabling an attacker to perform unauthorized actions on behalf of an authenticated administrator.

Exploitation

To exploit this vulnerability, an attacker crafts a malicious link or webpage that, when clicked by a logged-in administrator, triggers the activation of arbitrary plugins. Exploitation requires user interaction, as the administrator must be tricked into performing the action—such as clicking a link or submitting a form. No special privileges are needed beyond the administrator's session [1].

Impact

Successful exploitation could allow an attacker to force the activation of plugins, potentially including malicious ones. This could lead to further compromise of the WordPress site, such as installation of backdoors or other harmful functionality. The CVSS score of 4.3 (Medium) reflects the reliance on user interaction and the limited scope of actions that can be coerced [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. Users are strongly advised to update the plugin immediately if a fix becomes available. In the absence of a patch, consider removing the plugin or restricting access to its functionality. Administrators should also exercise caution when clicking links or interacting with untrusted content [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.