Description
The Simcast plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the settingsPage function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Plugin Settings Modification via CSRF
Action: Immediate Patch
AI Analysis

Impact

The Simcast WordPress plugin contains a Cross‑Site Request Forgery flaw in all releases up to and including 1.0.0, caused by missing or incorrect nonce validation in the settingsPage function. This flaw permits an unauthenticated attacker to send a forged request that, when executed by a logged‑in administrator, will change the plugin’s configuration settings. The attacker can influence any setting exposed by the plugin, potentially degrading site security or functionality.

Affected Systems

All WordPress sites that have the openchamp:Simcast plugin installed with a version 1.0.0 or earlier. The vulnerability is tied directly to the plugin’s settings management code and does not involve other components of WordPress.

Risk and Exploitability

The vulnerability scores a CVSS of 4.3, indicating moderate severity, and its EPSS score is less than 1%, suggesting a low probability of exploitation in the current environment. It is not listed in the CISA KEV catalog. Attackers would need to trick an administrator into clicking a malicious link or submitting a forged form, as the exploit relies on a CSRF vector rather than direct remote code execution.

Generated by OpenCVE AI on April 20, 2026 at 21:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Simcast to a version newer than 1.0.0
  • If an upgrade is not immediately possible, apply a temporary patch by adding proper nonce verification to the settingsPage handler or disabling the affected settings exposure to non‑authentic requests
  • Educate administrators to avoid clicking unknown links and enable additional CSRF protection plugins or security hardening measures

Generated by OpenCVE AI on April 20, 2026 at 21:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description The Simcast plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the settingsPage function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Simcast <= 1.0.0 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:25.530Z

Reserved: 2025-12-04T22:41:35.907Z

Link: CVE-2025-14077

cve-icon Vulnrichment

Updated: 2026-01-07T14:59:16.283Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:51.957

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:15:20Z

Weaknesses