Description
The Amazon affiliate lite Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the 'ADAL_settings_page' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-12-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery enabling unauthorized plugin settings modifications
Action: Immediate Patch
AI Analysis

Impact

The Amazon affiliate lite Plugin for WordPress has a missing or incorrectly implemented nonce check in the ADAL_settings_page function, creating a CSRF flaw. An attacker can send a forged request that an authenticated site administrator unknowingly submits, allowing the attacker to alter the plugin’s configuration. This impacts the integrity of the site’s affiliate settings, potentially redirecting traffic or changing commission parameters. The elevation of privileges is limited to plugin configuration, but changes can affect revenue and user experience.

Affected Systems

WordPress sites running the Amazon affiliate lite Plugin version 1.0.0 or earlier are vulnerable. The vendor is nestornoe, and the product is the Amazon affiliate lite Plugin. No specific product line or OS is mentioned; the issue is confined to the plugin code under the indicated versions.

Risk and Exploitability

With a CVSS score of 5.4, the vulnerability is considered moderate. The EPSS < 1% suggests a low probability of real world exploitation, and it is not listed in CISA’s KEV catalog. The likely attack vector is a phishing or social‑engineering attack that lures a site administrator to click a malicious link, as no authentication is required. The flaw requires a user with administrative privileges to be tricked into executing a request. Consequently, the risk is limited to sites that still run the vulnerable plugin version and have active admins who could be compromised.

Generated by OpenCVE AI on April 22, 2026 at 00:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amazon affiliate lite Plugin to a version newer than 1.0.0 that implements proper nonce verification in the settings update function.
  • Disable or uninstall the Amazon affiliate lite Plugin if the site no longer requires this functionality, ensuring no current or legacy configuration can be tampered with.
  • Enforce strict privileged account controls: limit administrative privileges to trusted users and use multi‑factor authentication to reduce the risk that an authenticated admin will unknowingly submit a forged request.

Generated by OpenCVE AI on April 22, 2026 at 00:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 20 Dec 2025 03:30:00 +0000

Type Values Removed Values Added
Description The Amazon affiliate lite Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the 'ADAL_settings_page' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Amazon affiliate lite Plugin <= 1.0.0 - Cross-Site Request Forgery to Plugin Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:45.715Z

Reserved: 2025-12-15T18:15:19.777Z

Link: CVE-2025-14734

cve-icon Vulnrichment

Updated: 2025-12-22T16:15:47.586Z

cve-icon NVD

Status : Deferred

Published: 2025-12-20T04:16:08.457

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14734

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:15:03Z

Weaknesses