Description
The Page Title, Description & Open Graph Updater plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.02. This is due to missing nonce validation on multiple AJAX actions including dieno_update_page_title. This makes it possible for unauthenticated attackers to update page titles and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-02-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Integrity Compromise
Action: Patch
AI Analysis

Impact

The vulnerability lies in a missing nonce check on multiple AJAX actions within the Page Title, Description & Open Graph Updater plugin, enabling an unauthenticated attacker to alter page titles and metadata. By forging a request, an attacker can trick a site administrator into performing an action that changes content on the site. Because the modified data can affect SEO, social media previews, and user perception, the primary outcome is a compromise of the integrity of the site’s content. The weakness is a classic Cross‑Site Request Forgery flaw (CWE‑352).

Affected Systems

Any WordPress installation running the Page Title, Description & Open Graph Updater plugin from the vendor dienodigital, in any version up to and including 1.02. No specific patch level beyond 1.02 is provided by the vendor in the advisory. The recommendation is to treat all revisions at or below 1.02 as vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate impact, while the EPSS of less than 1% suggests a low probability of wide exploitation. The vulnerability is not currently listed in CISA’s KEV catalog. Exploitation requires an unauthenticated user to coerce a logged‑in administrator to trigger a forged AJAX request; therefore, the attack vector relies on social engineering or malicious links. Successful exploitation permits arbitrary alteration of on‑page titles and metadata, but requires no further privileges once the administrator submits the request.

Generated by OpenCVE AI on April 21, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Page Title, Description & Open Graph Updater plugin to a release newer than 1.02 that implements nonce validation on all AJAX endpoints.
  • Configure the site so that only authenticated administrators can reach the plugin’s AJAX routes, and require multi‑factor authentication for administrative accounts.
  • Deploy a web‑application firewall or an additional CSRF protection plugin to detect and block unauthenticated attempts to modify page titles via the identified endpoints.

Generated by OpenCVE AI on April 21, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Dienodigital
Dienodigital page Title, Description & Open Graph Updater
Wordpress
Wordpress wordpress
Vendors & Products Dienodigital
Dienodigital page Title, Description & Open Graph Updater
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Page Title, Description & Open Graph Updater plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.02. This is due to missing nonce validation on multiple AJAX actions including dieno_update_page_title. This makes it possible for unauthenticated attackers to update page titles and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Page Title, Description & Open Graph Updater <= 1.02 - Cross-Site Request Forgery to Arbitrary Page Title Modification
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Dienodigital Page Title, Description & Open Graph Updater
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:35.601Z

Reserved: 2025-11-19T19:03:35.513Z

Link: CVE-2025-13438

cve-icon Vulnrichment

Updated: 2026-02-19T17:03:37.769Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:30.697

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13438

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:00:13Z

Weaknesses