First published: Fri Mar 28 2025(Updated: )
The tagDiv Composer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation within the td_ajax_get_views AJAX action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
KingComposer | <=5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1705 has a medium severity rating due to its potential impact on user data and site security.
To fix CVE-2025-1705, update the tagDiv Composer plugin to version 5.4 or later that includes security patches.
All versions of the tagDiv Composer plugin for WordPress up to and including 5.3 are affected by CVE-2025-1705.
CVE-2025-1705 is classified as a Cross-Site Request Forgery vulnerability.
Yes, CVE-2025-1705 can be exploited by unauthenticated attackers due to improper nonce validation.