Description
The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 11.1.2. This is due to missing or incorrect nonce validation on the adminEnableGdprAjax() function. This makes it possible for unauthenticated attackers to modify GDPR settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-10-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Monitor
AI Analysis

Impact

The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress suffers a Cross‑Site Request Forgery flaw caused by missing or incorrect nonce verification on the adminEnableGdprAjax() function. This defect allows an unauthenticated attacker to modify GDPR settings, potentially changing how user data is handled or disclosed. The weakness is categorized as CWE‑352 and may compromise the integrity of the site’s privacy compliance.

Affected Systems

All installations of the PixelYourSite plugin for WordPress with a version number of 11.1.2 or earlier are affected. The vulnerability exists in the admin interface that manages GDPR options; any site running those plugin versions could be impacted if an attacker convinces an administrator to follow a forged link.

Risk and Exploitability

The CVSS score for this vulnerability is 4.3, indicating a moderate risk. The EPSS score is below 1%, and it is not listed in CISA’s KEV catalog, suggesting exploitation activity is unlikely at present. However, the attack vector relies on a CSRF attack, so an adversary needs to trick an administrator into clicking a malicious link; once that occurs, they can change GDPR settings without any authentication.

Generated by OpenCVE AI on April 22, 2026 at 13:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PixelYourSite plugin to a version newer than 11.1.2, which contains proper nonce validation for GDPR controls.
  • Restrict access to the WordPress admin area to a trusted IP range or enforce two‑factor authentication so that only legitimate administrators can reach the GDPR settings.
  • Educate site administrators to verify that any hyperlink before clicking it comes from a trusted source and to avoid opening unfamiliar links that could trigger forged requests.

Generated by OpenCVE AI on April 22, 2026 at 13:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 18 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
References

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Pixelyoursite
Pixelyoursite pixelyoursite
Wordpress
Wordpress wordpress
Vendors & Products Pixelyoursite
Pixelyoursite pixelyoursite
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 06:45:00 +0000

Type Values Removed Values Added
Description The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 11.1.2. This is due to missing or incorrect nonce validation on the adminEnableGdprAjax() function. This makes it possible for unauthenticated attackers to modify GDPR settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title PixelYourSite <= 11.1.2 – Cross-Site Request Forgery to GDPR Options Modification
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Pixelyoursite Pixelyoursite
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:10.613Z

Reserved: 2025-09-16T22:42:49.411Z

Link: CVE-2025-10588

cve-icon Vulnrichment

Updated: 2025-10-22T13:32:47.552Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T07:15:32.603

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:15:17Z

Weaknesses