Description
The xShare plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the 'xshare_plugin_reset()' function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery that allows an unauthenticated attacker to reset plugin settings
Action: Apply Patch
AI Analysis

Impact

The xShare WordPress plugin includes a reset function that lacks a required nonce check, creating a Cross‑Site Request Forgery vulnerability. An attacker can fabricate a request that, when an administrator clicks a link, causes the plugin’s configuration to be reset. This loss of settings can lead to loss of functionality or expose the site to further attacks if the plugin settings control security‑relevant parameters.

Affected Systems

Vendors and products affected are the xShare plugin developed by anwerashif, used in WordPress installations. All released versions up to and including 1.0.1 are vulnerable, as the CSRF check is absent in those builds.

Risk and Exploitability

The CVSS score of 4.3 indicates a medium severity, and the EPSS score of less than 1% points to a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalogue. Based on the description it is inferred that the attack requires the victim to be an administrative user who is tricked into clicking a malicious link; the attacker can then trigger the reset without needing further authentication beyond the victim's session. This makes the vulnerability more exploitable in environments where administrators are not vigilant, but overall risk remains moderate due to the low availability of prepared exploit code.

Generated by OpenCVE AI on April 21, 2026 at 16:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor update that fixes the CSRF issue.
  • If an update cannot be applied immediately, block or remove the xshare_plugin_reset endpoint using a web application firewall or deny the request in the site’s .htaccess file
  • Educate site administrators to avoid clicking unfamiliar links and consider implementing additional CSRF defenses such as custom nonces in all plugin actions

Generated by OpenCVE AI on April 21, 2026 at 16:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description The xShare plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the 'xshare_plugin_reset()' function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title xShare <= 1.0.1 - Cross-Site Request Forgery to 'rs_plugin_reset' Parameter
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:26:15.307Z

Reserved: 2025-11-21T19:48:05.237Z

Link: CVE-2025-13527

cve-icon Vulnrichment

Updated: 2026-01-07T14:47:09.195Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:48.920

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:45:15Z

Weaknesses