VYPR
Medium severity4.3NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-62102

CVE-2025-62102

Description

Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case dofollow-case-by-case allows Cross Site Request Forgery.This issue affects DoFollow Case by Case: from n/a through <= 3.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in DoFollow Case by Case plugin for WordPress allows attackers to force privileged users to execute unwanted actions.

Vulnerability

Overview The DoFollow Case by Case WordPress plugin (versions up to and including 3.5.1) is vulnerable to Cross-Site Request Forgery (CSRF). This vulnerability arises from missing or insufficient CSRF token validation in the plugin's admin functionality, enabling unauthorized commands to be submitted on behalf of an authenticated administrator [1].

Exploitation

Prerequisites Exploitation requires a privileged user (e.g., administrator) to perform an action such as clicking a malicious link or visiting a crafted page while authenticated to the WordPress site. The attacker must trick the user into initiating the request, but no additional authentication or network access is needed beyond standard web interaction [1].

Impact

A successful CSRF attack can force the targeted user to execute unintended actions under their current privileges, such as changing plugin settings or other administrative operations. Because the compromised user has elevated access, the attacker may achieve modifications without direct authentication [1].

Mitigation

The vendor has addressed this vulnerability in version 3.6.0 of the plugin. Users are advised to update to 3.6.0 or later to remediate the issue. Patchstack users can enable auto-updates for vulnerable plugins. The vulnerability is rated with a medium severity (CVSS 4.3) and is considered low risk for exploitation, though it may be used in mass campaigns against unpatched sites [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.