Description
The Top Bar Notification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on th tbn_ajax_add() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-11-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via CSRF
Action: Patch
AI Analysis

Impact

The Top Bar Notification plugin for WordPress contains a critical flaw where the th tbn_ajax_add() function does not correctly validate the nonce. This missing protection allows an attacker to perform a cross‑site request forgery that updates the plugin’s settings and injects malicious scripts into the site’s stored data. The resulting stored cross‑site scripting can lead to execution of arbitrary JavaScript in the context of site visitors, potentially compromising user sessions, defacing content, or facilitating further attacks through replayed payloads.

Affected Systems

Users of the Top Bar Notification plugin from vendor josereyev, specifically all releases version 1.12 and earlier, are affected. No specific patch levels are listed, but the vulnerability applies to the entire vulnerability window up to and including 1.12.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score being less than 1% suggests a low but non‑zero likelihood of exploitation under current threat conditions. The vulnerability is not listed in the CISA KEV catalog. Successful exploitation requires an unauthenticated attacker to trick a site administrator into triggering the forged AJAX request, typically via a malicious link or phishing email. While the attack surface is restricted to users with administrative privileges, any admin click can activate the stored XSS, making the risk significant for active WordPress sites.

Generated by OpenCVE AI on April 27, 2026 at 23:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Top Bar Notification plugin to a version newer than 1.12.
  • If upgrading is not immediately possible, deactivate the plugin or remove the th tbn_ajax_add() functionality by editing the plugin file or adding a hook to disallow AJAX requests from unauthenticated users.
  • After the upgrade or mitigation, review and reset any plugin settings that may have been altered by the CSRF attack, and verify that no malicious scripts remain in stored content.

Generated by OpenCVE AI on April 27, 2026 at 23:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Top Bar Notification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on th tbn_ajax_add() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Top Bar Notification <= 1.12 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:13.704Z

Reserved: 2025-10-28T15:34:37.419Z

Link: CVE-2025-12412

cve-icon Vulnrichment

Updated: 2025-11-04T20:53:20.883Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:16:13.150

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12412

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:00:14Z

Weaknesses