Description
The Quran Gateway plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing nonce validation in the quran_gateway_options function. This makes it possible for unauthenticated attackers to modify the plugin's display settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-12-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes via CSRF
Action: Patch Immediately
AI Analysis

Impact

The Quran Gateway plugin for WordPress suffers from a Cross‑Site Request Forgery flaw caused by a missing nonce check in its settings update handler. This flaw allows an attacker who can trick a site administrator into clicking a crafted link to change the plugin’s display settings without authentication. The consequence is a loss of integrity of configuration data; affected settings may redirect users or alter content presentation, potentially impacting user experience and trust. No remote code execution or data exfiltration is provided by the flaw, but the integrity impact can be significant when the plugin controls key on‑site text or redirects.

Affected Systems

The vulnerability exists in all releases of the Quran Gateway plugin up to and including version 1.5, distributed by the vendor edckwt. Systems running WordPress with this plugin installed are affected, regardless of the WordPress core version. The vendor’s product name is Quran Gateway; no other vendors are impacted.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, largely because the flaw requires the victim to be an authenticated administrator. The EPSS score of less than 1 % suggests a very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be an HTTP request that an administrator unknowingly submits, perhaps through a malicious link or embed. Exploitation would require social engineering of a site admin, and the damage is limited to configuration changes rather than full server compromise.

Generated by OpenCVE AI on April 21, 2026 at 17:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Quran Gateway plugin to a release newer than 1.5 where the CSRF issue is fixed. If no update is available, uninstall the plugin entirely.
  • Configure the WordPress security plugin or Web Application Firewall to block unauthenticated POST requests to the plugin’s admin endpoint or to enforce presence of a nonce token.
  • Educate site administrators to avoid clicking unknown links or to verify the source of any links that seem to modify site settings.

Generated by OpenCVE AI on April 21, 2026 at 17:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 20 Dec 2025 03:30:00 +0000

Type Values Removed Values Added
Description The Quran Gateway plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing nonce validation in the quran_gateway_options function. This makes it possible for unauthenticated attackers to modify the plugin's display settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Quran Gateway <= 1.5 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:48.500Z

Reserved: 2025-12-05T21:15:22.716Z

Link: CVE-2025-14164

cve-icon Vulnrichment

Updated: 2025-12-22T16:14:51.405Z

cve-icon NVD

Status : Deferred

Published: 2025-12-20T04:16:07.687

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses