CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3Description
Cross-Site Request Forgery (CSRF) vulnerability in Mohammad Parsa Logo Manager For Samandehi allows Stored XSS. This issue affects Logo Manager For Samandehi: from n/a through 0.5.
Analysis
CVE-2025-52780 is a CSRF vulnerability in Mohammad Parsa Logo Manager For Samandehi (versions through 0.5) that enables Stored XSS attacks, allowing unauthenticated attackers to perform unauthorized actions and inject malicious scripts affecting other users. The vulnerability has a CVSS score of 7.1 (High) and exploits weak CSRF protections in an admin/management plugin, with the attack requiring user interaction (UI:R) but affecting multiple users via stored payload persistence.
Technical Context
The vulnerability exists in the Logo Manager For Samandehi WordPress plugin, a file/asset management component for the Samandehi e-commerce platform. The root cause is CWE-352 (Cross-Site Request Forgery), which indicates insufficient or missing CSRF token validation on state-changing operations. The plugin fails to implement proper nonce verification on form submissions that modify logo assets, allowing attackers to craft malicious requests. The presence of Stored XSS (as mentioned in the description) suggests the CSRF vulnerability allows injection of unsanitized data into persistent storage, compounding the severity—an attacker can forge a request to submit logo data containing JavaScript payloads that execute in admin and user browsers when the logo is subsequently rendered. This combination of CSRF + Stored XSS creates a persistent threat affecting all site visitors.
Affected Products
Mohammad Parsa Logo Manager For Samandehi (0.5 and earlier (n/a through 0.5 suggests all tracked versions))
Remediation
Update Logo Manager For Samandehi to version > 0.5 when released by Mohammad Parsa. Monitor vendor's official repository/WordPress Plugin Directory for security updates.; priority: Critical Workaround (Temporary): Disable the Logo Manager plugin until a patched version is available. If functionality is required, restrict plugin admin access via firewall rules or .htaccess to trusted IP ranges only.; priority: High Mitigation: Implement Web Application Firewall (WAF) rules to detect and block CSRF attacks targeting logo upload/management endpoints. Monitor for suspicious logo asset submissions containing script tags (<script>, onclick, onerror, etc.). Enforce Content Security Policy (CSP) headers to limit inline script execution.; priority: High Preventive Code Fix: Vendor must implement WordPress nonce verification using wp_verify_nonce() on all POST/PUT requests modifying logo data. Sanitize and escape all logo metadata output with esc_attr(), wp_kses_post(), or equivalent. Validate logo file types server-side.; priority: Critical
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28459