VYPR
Medium severity4.3NVD Advisory· Published Sep 26, 2025· Updated Apr 23, 2026

CVE-2025-60145

CVE-2025-60145

Description

Cross-Site Request Forgery (CSRF) vulnerability in yonifre Lenix scss compiler lenix-scss-compiler allows Cross Site Request Forgery.This issue affects Lenix scss compiler: from n/a through <= 1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in the Lenix scss compiler WordPress plugin allows attackers to force privileged users to execute unwanted actions.

Vulnerability

Overview

The Lenix scss compiler plugin for WordPress (versions up to and including 1.2) contains a Cross-Site Request Forgery (CSRF) vulnerability. This flaw arises because the plugin does not properly validate or require a nonce or other anti-CSRF token when processing state-changing requests. As a result, an attacker can craft a malicious link or form that, when clicked or submitted by an authenticated administrator, triggers unintended actions on the victim's site [1].

Exploitation

Prerequisites

Exploitation requires user interaction: a privileged user (such as an administrator) must be tricked into clicking a malicious link, visiting a crafted page, or submitting a specially designed form while authenticated to the WordPress admin panel. No additional authentication is needed for the attacker beyond the ability to deliver the crafted request to the victim. The attack can be performed remotely without any special network position [1].

Impact

Successful exploitation allows an attacker to force the victim to perform actions under their current session, such as modifying plugin settings, deleting data, or performing other administrative tasks without the victim's consent. This could lead to partial loss of integrity and availability of the affected site, depending on the actions executed [1].

Mitigation

The vulnerability affects all versions of the Lenix scss compiler plugin from n/a through 1.2. Users are strongly advised to update the plugin to a patched version as soon as it becomes available. If an update is not possible, consider disabling the plugin or implementing additional security measures such as Web Application Firewall (WAF) rules to block CSRF attacks. The vendor has been notified and a fix is expected [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.