Description
The BMLT WordPress Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.11.4. This is due to missing nonce validation on the 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option ' action. This makes it possible for unauthenticated attackers to create new plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-12-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized creation or deletion of plugin settings via CSRF
Action: Patch
AI Analysis

Impact

The vulnerability is a missing nonce check in the BMLT WordPress Satellite plugin's create and delete option actions. An attacker can forge a request that causes an authenticated site administrator to execute a request that creates or deletes plugin configuration values. This allows unauthenticated attackers to alter the plugin’s behavior, potentially leading to defacement, loss of functionality, or a sub‑optimal user experience. The weakness is identified as a Cross‑Site Request Forgery (CWE‑352).

Affected Systems

magblogapi BMLT WordPress Satellite plugin version 3.11.4 and earlier are affected. All installations of this plugin up to and including 3.11.4 are vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, and the EPSS score of < 1% shows a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker craft a forged request and obtain an administrator’s logged‑in session cookie, typically by tricking the administrator into clicking a malicious link. Because the attack relies on user interaction, the likelihood is modest, but the impact of changing or deleting settings could disrupt site operations or downgrade security, making remediation advisable.

Generated by OpenCVE AI on April 22, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest BMLT WordPress Satellite plugin version that incorporates nonce validation for create and delete option actions.
  • If an upgrade is not available, temporarily disable the create and delete functions in the plugin or remove the plugin entirely until a patch is applied.
  • Enable multi‑factor authentication for administrative WordPress accounts and educate administrators to avoid clicking suspicious links from untrusted sources.

Generated by OpenCVE AI on April 22, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Magblogapi
Magblogapi bmlt Wordpress Plugin
Wordpress
Wordpress wordpress
Vendors & Products Magblogapi
Magblogapi bmlt Wordpress Plugin
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The BMLT WordPress Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.11.4. This is due to missing nonce validation on the 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option ' action. This makes it possible for unauthenticated attackers to create new plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title BMLT WordPress Plugin <= 3.11.4 - Cross-Site Request Forgery to Settings Creation and Deletion
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Magblogapi Bmlt Wordpress Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:49.977Z

Reserved: 2025-12-05T20:46:00.918Z

Link: CVE-2025-14162

cve-icon Vulnrichment

Updated: 2025-12-15T18:09:07.445Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:48.930

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14162

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:30:22Z

Weaknesses