Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-39601 β€” AI Deep Analysis Summary

CVSS 9.6 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A **CSRF** vulnerability in the WordPress plugin allows attackers to force users to execute unintended actions. <br>πŸ’₯ **Consequences**: This leads to **Remote Code Execution (RCE)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-352** (Cross-Site Request Forgery). <br>πŸ” **Flaw**: The plugin fails to validate the origin of POST requests.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Product**: **Custom CSS, JS & PHP** plugin by **WPFactory**. <br>πŸ“… **Versions**: All versions **up to and including 2.4.1**. <br>🌐 **Platform**: WordPress sites running this specific plugin version.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Capabilities**: <br>1. **Execute Arbitrary Code**: Inject PHP scripts via the plugin's interface. <br>2. **Full System Compromise**: Achieve **Remote Code Execution (RCE)**. <br>3.…

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Exploitation Threshold**: **Low**. <br>πŸ”‘ **Auth**: Requires **Privileges: None (PR:N)** for the attacker, but **User Interaction (UI:R)** is needed (e.g., tricking an admin into clicking a link).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: **YES**. <br>πŸ“‚ **PoC Available**: A Proof of Concept is publicly available on GitHub (`Nxploited/CVE-2025-39601`).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. **Scan**: Use vulnerability scanners to detect **WPFactory Custom CSS, JS & PHP** version <= 2.4.1. <br>2.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. <br>πŸ“’ **Action**: Update the **Custom CSS, JS & PHP** plugin to a version **newer than 2.4.1**.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1. **Disable**: Deactivate and delete the plugin if not strictly needed. <br>2. **Restrict**: Limit admin access to trusted IPs only. <br>3.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL / IMMEDIATE ACTION REQUIRED**. <br>πŸ“‰ **Priority**: **P0**. <br>πŸ’‘ **Reason**: CVSS Score **9.6**, public PoC exists, and it leads directly to **RCE**. Do not delay patching or mitigation.