Description
Cross-Site Request Forgery (CSRF) vulnerability in Jerry Rietveld Call Now Button call-now-button allows Cross Site Request Forgery.This issue affects Call Now Button: from n/a through <= 1.4.13.
Published: 2025-01-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A cross‑site request forgery weakness exists in the WordPress Call Now Button plugin, classified as CWE‑352. The flaw permits an attacker to cause a logged‑in user to send a request to the plugin’s endpoints without the user’s explicit consent. Based on the description, it is inferred that the attacker could potentially modify or submit data through the plugin, thereby compromising the integrity of the site’s content or configuration.

Affected Systems

The vulnerability affects all releases of the Jerry Rietveld Call Now Button plugin up to and including version 1.4.13. Any WordPress installation that has installed the plugin at any earlier version is therefore susceptible; no other products or later versions are listed as impacted.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% signifies a low probability of exploitation at present. The issue is not listed in the CISA KEV catalog. Exploitation would normally require an authenticated user to visit a maliciously crafted URL that targets a vulnerable endpoint within the plugin. Therefore, the risk is limited to sites where such a request can be delivered to a legitimate user session.

Generated by OpenCVE AI on May 2, 2026 at 09:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Call Now Button plugin to version 1.4.14 or later, where the CSRF issue is resolved.
  • If an upgrade is not immediately possible, temporarily disable the plugin or restrict access to its admin interface to trusted users or IP addresses.
  • Implement site‑wide CSRF protection, such as ensuring that all WordPress admin requests require nonces, or deploy a web application firewall rule that blocks suspicious request patterns to the plugin’s endpoints.

Generated by OpenCVE AI on May 2, 2026 at 09:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3928 Cross-Site Request Forgery (CSRF) vulnerability in NowButtons.com Call Now Button allows Cross Site Request Forgery. This issue affects Call Now Button: from n/a through 1.4.13.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in NowButtons.com Call Now Button allows Cross Site Request Forgery. This issue affects Call Now Button: from n/a through 1.4.13. Cross-Site Request Forgery (CSRF) vulnerability in Jerry Rietveld Call Now Button call-now-button allows Cross Site Request Forgery.This issue affects Call Now Button: from n/a through <= 1.4.13.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}


Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in NowButtons.com Call Now Button allows Cross Site Request Forgery. This issue affects Call Now Button: from n/a through 1.4.13.
Title WordPress Call Now Button plugin <= 1.4.13 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:33.588Z

Reserved: 2025-01-23T14:52:51.692Z

Link: CVE-2025-24738

cve-icon Vulnrichment

Updated: 2025-02-12T19:54:56.427Z

cve-icon NVD

Status : Deferred

Published: 2025-01-24T18:15:48.017

Modified: 2026-04-23T15:25:24.800

Link: CVE-2025-24738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T09:30:20Z

Weaknesses