Description
Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification error-notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through <= 0.2.7.
Published: 2025-01-16
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Error Notification plugin for WordPress contains a Cross‑Site Request Forgery flaw that enables an attacker to submit malicious requests to the plugin’s error‐logging endpoints. By exploiting this flaw, an attacker can embed arbitrary JavaScript that is saved within the plugin’s error logs and executed whenever any user views those logs, resulting in stored cross‑site scripting. This creates a high‑severity compromise of user sessions and site data.

Affected Systems

The vulnerability affects all versions of the Error Notification plugin by Taras Dashkevych, from the earliest release through version 0.2.7. Any WordPress installation that has the plugin installed and enabled and that runs a version 0.2.7 or earlier is impacted.

Risk and Exploitability

The CVSS score of 7.1 indicates a high risk. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in CISA's KEV catalog. Attackers would execute the CSRF vector by tricking a browser into sending a forged request—typically through a malicious link or embedded image—while the victim is authenticated to the WordPress site or remains an active user. The stored XSS payload then runs in the victim’s browser, potentially stealing credentials or hijacking sessions.

Generated by OpenCVE AI on May 1, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest update to the Error Notification plugin as released by Taras Dashkevych.
  • If an update is not immediately available, disable or uninstall the plugin to eliminate the CSRF vector.
  • Configure the plugin to enforce anti‑CSRF tokens on all error‑logging requests and require the same‑site cookie attribute; if this is not possible, restrict the error‑notification functionality to the WordPress administrative interface only.

Generated by OpenCVE AI on May 1, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3520 Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7. Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification error-notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through <= 0.2.7.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 17 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 20:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7.
Title WordPress Error Notification plugin <= 0.2.7 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:24.278Z

Reserved: 2025-01-16T11:32:03.805Z

Link: CVE-2025-23902

cve-icon Vulnrichment

Updated: 2025-01-17T17:16:23.427Z

cve-icon NVD

Status : Deferred

Published: 2025-01-16T21:15:32.173

Modified: 2026-04-23T15:24:44.657

Link: CVE-2025-23902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T20:30:05Z

Weaknesses