Description
The WP Global Screen Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing nonce validation on the `updatewpglobalscreenoptions` action handler. This makes it possible for unauthenticated attackers to modify global screen options for all users via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Published: 2025-11-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Cross‑Site Request Forgery modifies global screen options for all users
Action: Patch Now
AI Analysis

Impact

The WP Global Screen Options plugin has a missing nonce check in its administrative action handler, which allows an unauthenticated attacker to send a forged request that changes the global screen options for every user. The change does not reveal sensitive data but can alter the user interface and workflow for all administrators and site users. The weakness is a Cross‑Site Request Forgery flaw, identified as CWE‑352.

Affected Systems

WordPress sites that have the WP Global Screen Options plugin by stiand installed, versions 0.2 and earlier are affected.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity and the EPSS score is below 1%, pointing to a low probability of widespread exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to lure an administrator into clicking a crafted link or submitting a form that triggers the vulnerable action; no administrator credentials are required, but the attack relies on user interaction. The likely attack vector involves an administrator clicking a malicious link, which is inferred from the description. Because the impact is limited to interface configuration and does not grant direct data access or code execution, the overall risk is moderate but warrants timely remediation.

Generated by OpenCVE AI on April 22, 2026 at 00:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Global Screen Options plugin to a version newer than 0.2, or uninstall the plugin if no upgrade exists.
  • If an immediate update is not possible, remove or disable the updatewpglobalscreenoptions hook, or restrict it to users with the admin capability to prevent unauthorized changes.
  • Deploy a firewall or security plugin rule to block forged POST requests targeting the updatewpglobalscreenoptions action, ensuring only legitimate, non-privileged requests are accepted.

Generated by OpenCVE AI on April 22, 2026 at 00:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The WP Global Screen Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing nonce validation on the `updatewpglobalscreenoptions` action handler. This makes it possible for unauthenticated attackers to modify global screen options for all users via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Title WP Global Screen Options <= 0.2 - Cross-Site Request Forgery to Screen Options Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:27:25.458Z

Reserved: 2025-10-22T13:54:39.633Z

Link: CVE-2025-12069

cve-icon Vulnrichment

Updated: 2025-11-04T18:47:56.216Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T04:15:37.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses