Description
The Popover Windows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-12-13
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery permitting arbitrary configuration changes
Action: Apply Patch
AI Analysis

Impact

The Popover Windows WordPress plugin is vulnerable to Cross‑Site Request Forgery in all versions up to and including 1.2. The flaw stems from missing or incorrect nonce validation, allowing an attacker to craft a forged request that will be accepted as if submitted by a logged‑in administrator. In effect, an unauthenticated attacker can alter the plugin’s settings, potentially redirecting site content, exposing sensitive data, or otherwise compromising the site’s behavior. The weakness is identified as CWE‑352. The vulnerability does not expose any direct data leakage or privilege escalation but can compromise the integrity of the site’s configuration.

Affected Systems

WordPress sites that have installed the Popover Windows plugin from melodicmedia. Versions 1.2 and below are affected; no specific patch version is listed in the advisory, so users should verify whether an updated release (post‑1.2) is available and install it.

Risk and Exploitability

The CVSS score of 4.3 places this bug in the Moderate range, reflecting its limited impact. The EPSS score of less than 1% indicates that the probability of this vulnerability being actively exploited is very low at this time. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers would need to entice an administrator to click a malicious link or submit a forged form; no authentication or privileged system access is required to exploit the flaw.

Generated by OpenCVE AI on April 21, 2026 at 00:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Popover Windows plugin to the latest available version, which must be newer than 1.2.
  • If no newer release exists, uninstall the plugin.
  • If the plugin is required, restrict access to the plugin’s admin pages to trusted users and implement additional server‑side checks such as validating the referer header.

Generated by OpenCVE AI on April 21, 2026 at 00:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Popover Windows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Popover Windows <= 1.2 - Cross-Site Request Forgery to Arbitrary Popover Configuration Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:13.154Z

Reserved: 2025-12-09T22:11:23.702Z

Link: CVE-2025-14394

cve-icon Vulnrichment

Updated: 2025-12-15T15:43:09.863Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:49.100

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:00:12Z

Weaknesses