Description
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to inverted nonce verification logic in the amp_theme_ajaxcomments AJAX handler, which rejects requests with VALID nonces and accepts requests with MISSING or INVALID nonces. This makes it possible for unauthenticated attackers to submit comments on behalf of logged-in users via a forged request granted they can trick a user into performing an action such as clicking on a link, and the plugin's template mode is enabled.
Published: 2026-01-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Patch Update
AI Analysis

Impact

The AMP for WP – Accelerated Mobile Pages plugin contains a logic error that inverts nonce validation in the new comments AJAX handler. Valid nonces are rejected while missing or invalid nonces are accepted. This flaw enables unauthenticated attackers to forge comment submissions on behalf of logged‑in users via a simple browser request, provided the victim is tricked into visiting a crafted link and the plugin’s template mode is active. The vulnerability does not give direct code execution or data exfiltration but allows attackers to inject arbitrary comments, potentially spread spam or phishing links, and degrade user trust. The weakness is a classic Cross‑Site Request Forgery (CWE‑352).

Affected Systems

WordPress sites running the AMP for WP – Accelerated Mobile Pages plugin, versions 1.1.9 or earlier, with template mode enabled. The issue was discovered in the PHP file amp_theme_ajaxcomments and requires the plugin to be updated to a version newer than 1.1.9 to remove the inverted nonce logic.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score of less than 1% shows a very low likelihood of exploitation at the moment. The vulnerability is not listed in the CISA KEV catalog. Attack readiness requires an unauthenticated user to lure an authenticated visitor to a forged request; therefore, realistic attackers would likely need social engineering or a compromised site. Given the low exploitation probability, the risk to a site with strict user moderation may be moderate but could be higher where comment spam tolerance is low.

Generated by OpenCVE AI on April 22, 2026 at 15:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AMP for WP plugin to the latest version that removes the inverted nonce validation logic.
  • If an immediate update is not possible and the site must remain operational, disable the template mode feature via the plugin settings or remove the template-mode.php file to eliminate the vulnerable AJAX handler.
  • Apply a site‑wide anti‑CSRF measure, such as a trusted‑origin check or the WordPress built‑in wp_nonce_field when handling AJAX requests, to mitigate the risk of future similar flaws.

Generated by OpenCVE AI on April 22, 2026 at 15:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to inverted nonce verification logic in the amp_theme_ajaxcomments AJAX handler, which rejects requests with VALID nonces and accepts requests with MISSING or INVALID nonces. This makes it possible for unauthenticated attackers to submit comments on behalf of logged-in users via a forged request granted they can trick a user into performing an action such as clicking on a link, and the plugin's template mode is enabled.
Title AMP for WP – Accelerated Mobile Pages <= 1.1.9 - Cross-Site Request Forgery to Comment Submission
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:14.456Z

Reserved: 2025-12-10T16:39:16.138Z

Link: CVE-2025-14468

cve-icon Vulnrichment

Updated: 2026-01-07T14:53:09.991Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:55.210

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:00:12Z

Weaknesses