Description
The Latest Tabs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the settings update handler in admin-page.php. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes via CSRF
Action: Patch
AI Analysis

Impact

The Latest Tabs plugin for WordPress suffers from a Cross‑Site Request Forgery flaw caused by missing or incorrect nonce validation in the settings update handler located in admin-page.php. As a result, an attacker who can persuade a site administrator to click a malicious link can alter the plugin’s configuration settings without authentication. This weakness is classified under CWE‑352, indicating the vulnerability arises from insufficient request validation. The impact is limited to configuration changes, but such changes could indirectly affect site behaviour or enable further compromise if the plugin controls critical display functions.

Affected Systems

Kentothemes’ Latest Tabs plugin is affected in all releases up to and including version 1.5. Users of any installation of this plugin that has not been updated beyond 1.5 are at risk.

Risk and Exploitability

The CVSS score of 4.3 reflects moderate severity, while the EPSS score of less than 1% suggests a low likelihood of real‑world exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, indicating it is not registered as a known actively exploited weakness. Exploitation requires an attacker to convince an administrator to visit a crafted URL; no elevated privileges or server-side access are needed for the attack to succeed.

Generated by OpenCVE AI on April 21, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kentothemes’ Latest Tabs plugin to a version newer than 1.5, when available
  • If an upgrade is not feasible, disable or uninstall the plugin to eliminate the attack surface
  • Verify that all settings update endpoints within the plugin include proper WordPress nonce checks to prevent future CSRF attempts

Generated by OpenCVE AI on April 21, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Latest Tabs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the settings update handler in admin-page.php. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Latest Tabs <= 1.5 - Cross-Site Request Forgery to Plugin's Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:08.966Z

Reserved: 2025-12-20T17:34:28.997Z

Link: CVE-2025-14999

cve-icon Vulnrichment

Updated: 2026-01-07T16:35:25.341Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:58.240

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:45:15Z

Weaknesses