Description
Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS add-rss allows Stored XSS.This issue affects Add RSS: from n/a through <= 1.5.
Published: 2025-01-16
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery in the Dan Cameron Add RSS WordPress plugin can be used to perform a Stored XSS attack. An attacker who tricks an authenticated administrator into submitting a form (or visiting a crafted URL) can inject malicious JavaScript that is saved in the plugin’s data store. When any user loads the affected page, the script executes in that user’s browser, enabling session hijacking, defacement, or the execution of additional malicious payloads. This flaw is an instance of CWE‑352, a CSRF vulnerability that leads to stored cross‑site scripting.

Affected Systems

All WordPress sites that use the Dan Cameron Add RSS plugin version 1.5 or older are affected. The vulnerability applies across all installations that have the plugin installed, from the earliest release through 1.5 inclusive.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity. EPSS <1% suggests a low probability of exploitation at the moment, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, exploitation requires only that a logged‑in administrator be tricked into executing a forged request, a scenario that is realistically feasible in many environments. An attacker could obtain the administrative session cookie through social engineering or compromised credentials, then submit the forged request to inject XSS, leading to compromised user sessions and potential data theft.

Generated by OpenCVE AI on May 1, 2026 at 20:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Dan Cameron Add RSS WordPress plugin.
  • If a newer version is unavailable, uninstall the plugin entirely to eliminate the vulnerability.
  • As a temporary workaround, restrict the plugin’s functionality so that only administrators can use it; deny all other user roles access to its settings.

Generated by OpenCVE AI on May 1, 2026 at 20:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3513 Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS allows Stored XSS.This issue affects Add RSS: from n/a through 1.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS allows Stored XSS.This issue affects Add RSS: from n/a through 1.5. Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS add-rss allows Stored XSS.This issue affects Add RSS: from n/a through <= 1.5.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 17 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 20:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS allows Stored XSS.This issue affects Add RSS: from n/a through 1.5.
Title WordPress Add RSS plugin <= 1.5 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:24.181Z

Reserved: 2025-01-16T11:31:51.930Z

Link: CVE-2025-23895

cve-icon Vulnrichment

Updated: 2025-01-17T17:16:46.999Z

cve-icon NVD

Status : Deferred

Published: 2025-01-16T21:15:30.967

Modified: 2026-04-23T15:24:43.530

Link: CVE-2025-23895

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T20:30:05Z

Weaknesses