VYPR
Medium severity4.3NVD Advisory· Published Oct 31, 2025· Updated Apr 15, 2026

CVE-2025-8383

CVE-2025-8383

Description

The Depicter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions less than, or equal to, 4.0.4. This is due to missing or incorrect nonce validation on the depicter-document-rules-store function. This makes it possible for unauthenticated attackers to modify document rules via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Depicter WordPress plugin <=4.0.4 has a CSRF vulnerability allowing unauthenticated attackers to modify document rules via forged requests.

Vulnerability

Overview

The Depicter WordPress plugin, versions 4.0.4 and earlier, contains a Cross-Site Request Forgery (CSRF) vulnerability in the depicter-document-rules-store AJAX function. The root cause is missing or incorrect nonce validation on this endpoint, which processes POST requests to update document display rules [1]. This allows an attacker to force a logged-in administrator or editor to unknowingly modify rules without their consent.

Exploitation

Method

An unauthenticated attacker can craft a malicious HTML page that, when visited by a logged-in WordPress user with sufficient privileges, automatically submits a forged POST request to the vulnerable endpoint. The attack requires no authentication from the attacker and relies on social engineering to trick the victim into clicking a link or visiting the attacker's page [1]. The AJAX action depicter-document-rules-store is executed without proper CSRF token verification.

Impact

Successful exploitation allows the attacker to modify document display rules, including injecting attacker-controlled HTML into rule titles or content. This could lead to unauthorized content changes, defacement, or further attacks if the injected HTML is rendered in an administrative context [1]. The vulnerability does not directly allow code execution but can be used to alter how sliders, popups, and content blocks are displayed across the site.

Mitigation

The vendor has not released a patched version as of the publication date. Users are advised to apply the principle of least privilege, ensure administrators are cautious clicking behavior, and consider using a Web Application Firewall (WAF) to block forged requests. The vulnerability has a CVSS v3 score of 4.3 (Medium) and a public proof-of-concept exists [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.