Description
The Country Blocker for AdSense plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the CBFA_guardar_cbfa() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-02-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated modification of WordPress plugin settings through CSRF
Action: Apply Patch
AI Analysis

Impact

Country Blocker for AdSense establishes a mechanism to block certain geographies from accessing AdSense content. A flaw exists in versions up to 1.0 because the function that writes the new country rules does not enforce a nonce, allowing a crafted request to change settings without authentication. If an attacker can persuade an administrator to click a malicious link or otherwise submit a request, the plugin’s configuration could be altered to permit or deny traffic arbitrarily, undermining the site’s revenue and compliance controls.

Affected Systems

This issue affects the WordPress plugin Country Blocker for AdSense supplied by soyrodriguez, in all versions at or before 1.0. Sites running this plugin without a protective nonce check are susceptible. No explicit sub‑version range is given, so any installation of 1.0 or earlier is considered vulnerable.

Risk and Exploitability

With a CVSS score of 4.3 the flaw is considered medium severity. The EPSS score is reported as less than 1 %, indicating a very low probability of exploitation under current conditions, and the vulnerability is not listed in CISA’s KEV catalog. Despite that, the attack vector is straightforward CSRF against an unauthenticated user, making it exploitible with minimal effort if an admin is tricked into visiting a particular URL. Consequently, the risk is moderate but non‑negligible for administrators that rely on default trust in logged‑in users.

Generated by OpenCVE AI on April 22, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Country Blocker for AdSense to the latest available version or uninstall the plugin if it is no longer required.
  • If an update cannot be applied, remove or disable the settings page that performs configuration writes to eliminate the CSRF surface.
  • Enable two‑factor authentication for all WordPress administrator accounts to reduce the chance that an admin will unknowingly submit a malicious request.

Generated by OpenCVE AI on April 22, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Soyrodriguez
Soyrodriguez country Blocker For Adsense
Wordpress
Wordpress wordpress
Vendors & Products Soyrodriguez
Soyrodriguez country Blocker For Adsense
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Country Blocker for AdSense plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the CBFA_guardar_cbfa() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Country Blocker for AdSense <= 1.0 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Soyrodriguez Country Blocker For Adsense
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:36.711Z

Reserved: 2025-11-19T14:38:42.590Z

Link: CVE-2025-13413

cve-icon Vulnrichment

Updated: 2026-02-19T17:04:02.404Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:30.517

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:30:20Z

Weaknesses