EUVD-2025-17177

| CVE-2025-28986 HIGH
2025-06-06 [email protected]
8.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17177
CVE Published
Jun 06, 2025 - 13:15 nvd
HIGH 8.2

Description

Cross-Site Request Forgery (CSRF) vulnerability in Webaholicson Epicwin Plugin allows SQL Injection. This issue affects Epicwin Plugin: from n/a through 1.5.

Analysis

A Cross-Site Request Forgery (CSRF) vulnerability in Webaholicson Epicwin Plugin versions up to 1.5 allows unauthenticated attackers to perform unauthorized actions via crafted requests. While the CVE description anomalously mentions SQL Injection alongside CSRF, the CVSS vector (CWE-352: CSRF) and vector string indicate the primary threat is CSRF with consequential impacts on confidentiality (High) and availability (Low). The vulnerability requires user interaction (UI:R) and affects confidentiality significantly, making it a material risk for WordPress installations using this plugin, particularly if no active mitigation or patch is available.

Technical Context

This vulnerability affects Webaholicson Epicwin Plugin (WordPress plugin ecosystem, CPE likely wp:epicwin or similar), which processes user requests without sufficient CSRF token validation. CWE-352 (Cross-Site Request Forgery) describes the root cause: the application fails to implement or enforce anti-CSRF mechanisms (such as nonce verification in WordPress). The anomalous mention of SQL Injection in the description alongside CSRF suggests either: (1) a chained vulnerability where CSRF enables SQL Injection via unvalidated parameters, or (2) descriptive inaccuracy. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C) indicates network-based exploitation with low complexity, no privilege requirement, but user interaction needed—typical of CSRF. The scope change (S:C) indicates the impact extends beyond the vulnerable component, consistent with CSRF affecting other users or the application's broader state.

Affected Products

Epicwin Plugin (1.5 and earlier (versions n/a through 1.5))

Remediation

patch: Update Epicwin Plugin to version > 1.5 if available from Webaholicson. Check official WordPress plugin repository (wordpress.org/plugins/epicwin) for latest release.; priority: Immediate workaround: If patched version unavailable: (1) Disable Epicwin Plugin temporarily via wp-admin or remove from /wp-content/plugins/. (2) Review plugin code for CSRF-protected endpoints; implement nonce verification using wp_verify_nonce() if code audit is possible. (3) Implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns targeting the plugin.; priority: High detection: Monitor web logs for repeated POST/GET requests to Epicwin plugin endpoints without corresponding user sessions or referrer headers. Use WordPress security plugins (Wordfence, Sucuri) to detect CSRF-like patterns.; priority: Ongoing

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +41
POC: 0

Share

EUVD-2025-17177 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy