VYPR
Medium severity5.4NVD Advisory· Published Dec 31, 2025· Updated Apr 23, 2026

CVE-2025-62117

CVE-2025-62117

Description

Cross-Site Request Forgery (CSRF) vulnerability in Jayce53 EasyIndex easyindex allows Cross Site Request Forgery.This issue affects EasyIndex: from n/a through <= 1.1.1704.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in EasyIndex up to 1.1.1704 lets an attacker force privileged users into unwanted actions, typically exploited via social engineering.

Vulnerability

Overview

The EasyIndex WordPress plugin, versions n/a through 1.1.1704, suffers from a Cross-Site Request Forgery (CSRF) vulnerability [1]. This type of flaw occurs when a plugin fails to validate or include a unique token in requests that initiate state-changing actions, allowing an attacker to craft forged requests that are executed under the identity of an authenticated, higher-privileged user.

Exploitation & Attack Surface

Exploitation requires a logged-in administrative user to interact with a malicious link, visit a specially crafted page, or submit a hidden form [1]. The attacker does not need direct access to the target site but relies on social engineering to trick the privileged user into making an unintended request. The attack can be launched from any external site or email, targeting thousands of websites running the vulnerable plugin without needing prior authentication.

Impact

If a site administrator triggers the crafted request, the attacker can force the execution of unwanted actions under the administrator's active session [1]. Depending on the plugin's capabilities, this may include changing settings, adding or deleting content, or creating new privileged users, leading to partial compromise of the WordPress site.

Mitigation

Status

As of the publication date, users are urged to update the EasyIndex plugin to a patched version. If an update is not yet available, a security plugin that adds CSRF tokens to forms and requests can serve as a temporary workaround [1]. The vulnerability is included in risk assessments for mass-exploit campaigns, emphasizing the need for immediate action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.