VYPR
Medium severity4.3NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-62873

CVE-2025-62873

Description

Cross-Site Request Forgery (CSRF) vulnerability in Flashyapp WP Flashy Marketing Automation wp-flashy-marketing-automation allows Cross Site Request Forgery.This issue affects WP Flashy Marketing Automation: from n/a through <= 2.0.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in WP Flashy Marketing Automation plugin <= 2.0.8 allows attackers to force privileged users to execute unintended actions.

The WP Flashy Marketing Automation plugin for WordPress, up to version 2.0.8, is vulnerable to Cross-Site Request Forgery (CSRF). The flaw exists because the plugin fails to implement adequate CSRF protection mechanisms, such as nonce verification, on sensitive actions. This lack of validation makes it possible for an attacker to trick a logged-in administrator into unknowingly performing actions they did not intend [1].

The attack requires user interaction—specifically, a privileged user must click a malicious link, visit a crafted page, or submit a form while authenticated. An attacker can craft a request targeting the plugin's administrative functions and deliver it via social engineering, such as a link in an email or a hidden element on a website. Successful exploitation depends on the victim performing the action while their session is active [1].

If exploited, an attacker could force a higher-privileged user (such as an administrator) to execute unwanted actions under their current authentication. This could include modifying plugin settings, altering marketing automation rules, or performing other state-changing operations that compromise the integrity of the site's marketing functionality. The CVSSv3 score is 4.3 (Medium), reflecting the need for user interaction and the contextual impact [1].

The vulnerability has been addressed in version 2.0.9. Users are strongly advised to update to this latest version or enable auto-updates for vulnerable plugins. Patchstack has noted that while this specific issue has low severity and is unlikely to be mass-exploited, immediate action is recommended to prevent potential targeted attacks [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.