Description
The WP Admin Microblog plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.1. This is due to missing or incorrect nonce validation on the 'wp-admin-microblog' page. This makes it possible for unauthenticated attackers to send messages on behalf of an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-11-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery enabling attackers to post messages as an administrator
Action: Apply patch
AI Analysis

Impact

The WP Admin Microblog plugin for WordPress is vulnerable to Cross‑Site Request Forgery (CWE‑352) because it fails to validate nonces on the 'wp-admin-microblog' page. This flaw allows any unauthenticated attacker who can trick a site administrator into clicking a crafted link to cause the administrator to post a message on the microblog. The attacker does not gain direct code execution or data disclosure, but can create arbitrary posts under an admin’s identity and potentially spread misinformation or spam.

Affected Systems

The vulnerability affects all versions of the WP Admin Microblog plugin up to and including 3.1.1. Site administrators running WordPress with any of these plugin versions are at risk. No specific WordPress core versions are listed, so the issue is confined to the plugin itself.

Risk and Exploitability

The moderate CVSS score of 4.3 reflects moderate impact and requires attacker to target an authenticated administrator through a crafted request. Because the EPSS score is less than 1%, the likelihood of widespread exploitation is low, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to send a forged request to the microblog endpoint, which could be triggered by a malicious link or a compromised website that the admin visits.

Generated by OpenCVE AI on April 22, 2026 at 11:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Admin Microblog to a version newer than 3.1.1 or uninstall the plugin if no patch is available
  • Ensure that all form submissions to the microblog endpoint include a valid nonce and restrict the endpoint to authenticated administrators, and consider applying WordPress or plugin settings to enforce this
  • Review all installed plugins and update the WordPress core to the latest stable release so that any other potential nonce or CSRF issues are mitigated

Generated by OpenCVE AI on April 22, 2026 at 11:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 19 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Winkm89
Winkm89 wp Admin Microblog
Wordpress
Wordpress wordpress
Vendors & Products Winkm89
Winkm89 wp Admin Microblog
Wordpress
Wordpress wordpress

Tue, 18 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The WP Admin Microblog plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.1. This is due to missing or incorrect nonce validation on the 'wp-admin-microblog' page. This makes it possible for unauthenticated attackers to send messages on behalf of an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title WP Admin Microblog <= 3.1.1 - Cross-Site Request Forgery to Message Creation
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Winkm89 Wp Admin Microblog
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:23.845Z

Reserved: 2025-10-24T15:05:45.896Z

Link: CVE-2025-12173

cve-icon Vulnrichment

Updated: 2025-11-18T14:25:24.034Z

cve-icon NVD

Status : Deferred

Published: 2025-11-18T09:15:47.717

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12173

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses