CVE-2025-8383
Description
The Depicter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions less than, or equal to, 4.0.4. This is due to missing or incorrect nonce validation on the depicter-document-rules-store function. This makes it possible for unauthenticated attackers to modify document rules via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Depicter WordPress plugin <=4.0.4 has a CSRF vulnerability allowing unauthenticated attackers to modify document rules via forged requests.
Vulnerability
Overview
The Depicter WordPress plugin, versions 4.0.4 and earlier, contains a Cross-Site Request Forgery (CSRF) vulnerability in the depicter-document-rules-store AJAX function. The root cause is missing or incorrect nonce validation on this endpoint, which processes POST requests to update document display rules [1]. This allows an attacker to force a logged-in administrator or editor to unknowingly modify rules without their consent.
Exploitation
Method
An unauthenticated attacker can craft a malicious HTML page that, when visited by a logged-in WordPress user with sufficient privileges, automatically submits a forged POST request to the vulnerable endpoint. The attack requires no authentication from the attacker and relies on social engineering to trick the victim into clicking a link or visiting the attacker's page [1]. The AJAX action depicter-document-rules-store is executed without proper CSRF token verification.
Impact
Successful exploitation allows the attacker to modify document display rules, including injecting attacker-controlled HTML into rule titles or content. This could lead to unauthorized content changes, defacement, or further attacks if the injected HTML is rendered in an administrative context [1]. The vulnerability does not directly allow code execution but can be used to alter how sliders, popups, and content blocks are displayed across the site.
Mitigation
The vendor has not released a patched version as of the publication date. Users are advised to apply the principle of least privilege, ensure administrators are cautious clicking behavior, and consider using a Web Application Firewall (WAF) to block forged requests. The vulnerability has a CVSS v3 score of 4.3 (Medium) and a public proof-of-concept exists [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- drive.google.com/file/d/1Fph3k-uyN6tX4hHeupjdYsZWZe3gYjqo/viewnvd
- plugins.trac.wordpress.org/browser/depicter/trunk/app/routes/ajax.phpnvd
- plugins.trac.wordpress.org/changeset/3384613/nvd
- research.cleantalk.org/cve-2025-8383/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/c54e5cd9-cc51-4367-afe0-11a6abfc0437nvd
News mentions
0No linked articles in our index yet.