Impact
WordPress Plugin Curtain 1.0.2 has a cross‑site request forgery vulnerability that lets attackers toggle site maintenance mode by sending forged requests. The flaw stems from missing nonce validation when calling options‑general.php with curtain parameters, enabling an attacker to activate or deactivate maintenance mode without permission.
Affected Systems
The vulnerability affects the Curtain plugin version 1.0.2 deployed on WordPress sites. Any installation of this plugin, when enabled, is susceptible.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog. A typical exploitation path requires an attacker to coerce an authenticated administrator into submitting a malicious request, relying on the absence of nonce validation to perform an unauthorized state change.
OpenCVE Enrichment