Impact
The Stopwords for comments plugin permits unauthenticated users to trigger the addition or removal of stopwords via forged requests because nonce checks are omitted in the set_stopwords_for_comments and delete_stopwords_for_comments functions. This flaw, identified as a CSRF weakness, allows attackers to alter site content without authorization, potentially affecting the integrity of comment moderation and user experience.
Affected Systems
The vulnerability impacts the WordPress plugin Stopwords for comments, version 1.1 and all earlier releases. Administrators deploying these versions on any WordPress site are exposed.
Risk and Exploitability
With a CVSS score of 4.3 and an EPSS score below 1%, the technical severity is moderate but exploitation is unlikely, and the vulnerability is not listed in the CISA KEV catalog. The attack likely requires tricking a legitimate administrator into submitting a crafted request, making user awareness a key defense factor.
OpenCVE Enrichment