Description
Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5.
Published: 2025-01-16
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw that allows an attacker to inject malicious JavaScript into data stored by the MemeOne plugin. When the stored content is rendered, the injected script executes in the browsers of all visitors, enabling cookie theft, defacement, or other client‑side attacks. The flaw persists in the database, meaning the impact continues until the compromised data is removed or neutralized.

Affected Systems

All WordPress installations running the MemeOne plugin through version 2.0.5 are affected. The earliest known build is unspecified, so any deployment that has not upgraded past 2.0.5 remains vulnerable.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity. The EPSS score of < 1% represents a low but non‑zero likelihood of exploitation. The issue is not yet listed in CISA’s Known Exploited Vulnerabilities catalog. The most likely attack path is via a forged request constructed by a malicious web page or email that tricks a logged‑in user into submitting data that contains the malicious script. Once stored, the script runs on every page that displays the content, compromising the confidentiality and integrity of all site visitors. The vulnerability can be exploited by any user with permissions to submit content or by an attacker who can force a victim to trigger the CSRF request.

Generated by OpenCVE AI on May 1, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MemeOne plugin to the latest version that includes the CSRF protection fix.
  • If a newer version is not available, remove the plugin from the WordPress installation to eliminate the stored XSS vector.
  • Sanitize all content submitted through the plugin by stripping or escaping script tags before storing it in the database.
  • Deploy a Content Security Policy that disallows inline scripts and limits script execution to trusted domains.
  • Configure a Web Application Firewall rule to identify and block forged requests that target the plugin’s input endpoints.

Generated by OpenCVE AI on May 1, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3247 Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5.
History

Tue, 28 Apr 2026 19:30:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne memeone allows Stored XSS.This issue affects MemeOne: from n/a through <= 2.0.5. Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5.
References

Thu, 23 Apr 2026 15:30:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5. Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne memeone allows Stored XSS.This issue affects MemeOne: from n/a through <= 2.0.5.
References

Thu, 16 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5.
Title WordPress MemeOne plugin <= 2.0.5 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:13.299Z

Reserved: 2025-01-16T11:26:13.957Z

Link: CVE-2025-23559

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-01-16T20:15:39.650

Modified: 2026-04-28T19:28:47.123

Link: CVE-2025-23559

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T21:15:25Z

Weaknesses