Description
The Torod – The smart shipping and delivery portal for e-shops and retailers plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9. This is due to missing or incorrect nonce validation on the save_settings function. This makes it possible for unauthenticated attackers to modify plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-12-05
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Update Plugin
AI Analysis

Impact

The Torod shipping plugin contains a missing or incorrect nonce check in its save_settings routine, which lets an attacker send a forged request that will be processed as if it came from an authenticated administrator. Because the vulnerability does not require any credentials, an unauthenticated attacker can modify the plugin’s configuration by luring the site owner into clicking a crafted link.

Affected Systems

All WordPress installations that use the Torod – The smart shipping and delivery portal for e‑shops and retailers plugin, with affected releases up to and including version 1.9. Versions 1.10 and later contain the fix.

Risk and Exploitability

The CVSS score of 4.3 places the flaw in the moderate category, while an EPSS score of less than 1 % indicates a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a social‑engineering step to get the site administrator to trigger the vulnerable action, so the attack vector is remote but relies on a user interaction.

Generated by OpenCVE AI on April 27, 2026 at 22:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Torod plugin to version 1.10 or later, which includes the nonce validation fix.
  • If an update is not immediately feasible, block CSRF‑vulnerable admin URLs from unauthenticated access by enabling a site‑wide CSRF protection plugin or forcing network‑admin authentication for plugin settings.
  • Perform a security review of all plugin configuration pages to confirm that nonce validation exists and that only authenticated administrators can submit settings changes, replacing any missing checks with a proper nonce field.

Generated by OpenCVE AI on April 27, 2026 at 22:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
References

Fri, 05 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 05 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 06:30:00 +0000

Type Values Removed Values Added
Description The Torod – The smart shipping and delivery portal for e-shops and retailers plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9. This is due to missing or incorrect nonce validation on the save_settings function. This makes it possible for unauthenticated attackers to modify plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Torod – The smart shipping and delivery portal for e-shops and retailers <= 1.9 - Cross-Site Request Forgery To Plugin's Settings Modification
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:40:54.972Z

Reserved: 2025-10-27T21:06:28.880Z

Link: CVE-2025-12373

cve-icon Vulnrichment

Updated: 2025-12-05T13:05:52.315Z

cve-icon NVD

Status : Deferred

Published: 2025-12-05T07:16:10.880

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12373

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z

Weaknesses