Description
The WPBlogSyn plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the plugin's remote sync settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-14
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration change
Action: Patch immediately
AI Analysis

Impact

The WPBlogSyn plugin contains a Cross‑Site Request Forgery flaw that allows any unauthenticated user to alter the plugin’s remote sync settings. Missing or incorrect nonce validation means a crafted request can be accepted without the proper security token. If exploited, an attacker can modify where the plugin pushes or pulls content, potentially enabling unauthorized data transfer or disrupting site operations.

Affected Systems

All installations of the WPBlogSyn WordPress plugin from vendor Obridge Academy with version 1.0 or earlier are affected.

Risk and Exploitability

The CVSS score of 4.3 categorizes this vulnerability as moderate severity. The EPSS indicates a very low exploitation probability of less than 1%, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path involves a phishing or social engineering trick that causes an administrator to click a malicious link, thereby submitting a forged request that updates the remote sync configuration. Because the exploit requires the site administrator to perform an action, the risk is mitigated by security awareness and user training.

Generated by OpenCVE AI on April 22, 2026 at 20:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPBlogSyn plugin to a version that includes proper nonce validation or, if no fix is available, uninstall or disable the plugin.
  • Review and secure the remote sync configuration: verify the designated remote endpoints, remove any unintended or deprecated sync targets, and disable remote sync functionality until the plugin is patched.
  • Educate site administrators about CSRF risks and implement a phishing‑awareness program; optionally add an extra confirmation step before allowing sync configuration changes.

Generated by OpenCVE AI on April 22, 2026 at 20:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 14 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description The WPBlogSyn plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the plugin's remote sync settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title WPBlogSyn <= 1.0 - Cross-Site Request Forgery to Arbitrary Remote Sync Configuration Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:45.826Z

Reserved: 2025-12-09T20:39:24.005Z

Link: CVE-2025-14389

cve-icon Vulnrichment

Updated: 2026-01-14T15:45:13.031Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T06:15:52.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14389

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:15:20Z

Weaknesses