Description
The Multi Item Responsive Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'mioptions.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-10-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via Cross‑Site Request Forgery
Action: Apply Patch
AI Analysis

Impact

The Multi Item Responsive Slider WordPress plugin contains a Cross‑Site Request Forgery flaw caused by missing or incorrect nonce validation on the mioptions.php page. An unauthenticated attacker can craft a malicious link that, when followed by a site administrator using an authenticated session, causes the server to process a forged request that updates plugin settings. This update can embed malicious JavaScript, resulting in stored Cross‑Site Scripting that will execute in the browsers of all visitors to the site.

Affected Systems

All releases of the Multi Item Responsive Slider plugin up to and including version 1.0 are vulnerable. Any WordPress installation that has this plugin installed with a version in that range, and where an administrator account has the ability to visit the mioptions.php page, will be affected. Sites that have upgraded beyond 1.0 or that have removed the plugin are no longer at risk.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity vulnerability. The EPSS score of less than 1 % shows that current exploitation activity is very low, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to entice an administrator into clicking a crafted URL; once that condition is met, the CSRF request is executed and the malicious script stored. While the immediate threat is bounded by the need for social engineering, the resulting stored XSS can lead to session hijacking, credential theft, or other downstream attacks against site users.

Generated by OpenCVE AI on April 28, 2026 at 10:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Multi Item Responsive Slider plugin to a version newer than 1.0 or remove the plugin if no newer release exists.
  • Block unauthenticated access to mioptions.php by configuring the web server (for example, with an .htaccess rule) or by applying a firewall rule to deny such requests.
  • Ensure that all administrator accounts use strong authentication and, when possible, enable two‑factor authentication to reduce the likelihood of accidental or malicious click‑through to CSRF URLs.

Generated by OpenCVE AI on April 28, 2026 at 10:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 24 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Oct 2025 08:30:00 +0000

Type Values Removed Values Added
Description The Multi Item Responsive Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'mioptions.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Multi Item Responsive Slider <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:51.759Z

Reserved: 2025-10-20T19:56:30.327Z

Link: CVE-2025-11992

cve-icon Vulnrichment

Updated: 2025-10-24T16:46:47.620Z

cve-icon NVD

Status : Deferred

Published: 2025-10-24T09:15:43.547

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11992

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses