Description
Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor wp-keyword-monitor allows Cross Site Request Forgery.This issue affects WP Keyword Monitor: from n/a through <= 1.0.5.
Published: 2025-02-07
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery (CWE-352) in the WP Keyword Monitor plugin permits an attacker to forge requests from the perspective of a legitimate, authenticated WordPress user. This can enable the attacker to perform unauthorized actions such as modifying plugin settings, posting content, or altering site behavior. The vulnerability has the potential to be escalated to a broader compromise if abused to inject malicious scripts, but the description does not confirm a stored XSS component.

Affected Systems

The flaw affects the WordPress plugin WP Keyword Monitor published by blackus3r. All released versions through and including 1.0.5 are vulnerable, regardless of WordPress installation. Only installations that have not yet upgraded beyond 1.0.5 are at risk.

Risk and Exploitability

With a CVSS score of 7.1, the vulnerability is considered high impact. The EPSS score of less than 1% indicates that exploitation is currently unlikely but still possible, especially where attackers have identified targets. The flaw is not listed in the CISA KEV catalog, meaning no known widespread exploitation has been reported. An attacker would typically need the victim to be authenticated and would poison a CSRF‑enabled request, possibly delivered via a malicious link or embedded form. If leveraged, it can compromise the integrity of site content and potentially breach confidentiality.

Generated by OpenCVE AI on May 1, 2026 at 17:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Keyword Monitor plugin to the latest available version to apply the CSRF fix.
  • If an update cannot be performed immediately, temporarily disable the WP Keyword Monitor plugin to eliminate the attack surface.
  • Enforce strong authentication for site administrators, such as two‑factor authentication, and review user roles to minimize exposure to privileged actions.

Generated by OpenCVE AI on May 1, 2026 at 17:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4024 Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor allows Stored XSS. This issue affects WP Keyword Monitor: from n/a through 1.0.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor allows Stored XSS. This issue affects WP Keyword Monitor: from n/a through 1.0.5. Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor wp-keyword-monitor allows Cross Site Request Forgery.This issue affects WP Keyword Monitor: from n/a through <= 1.0.5.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 07 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 10:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in blackus3r WP Keyword Monitor allows Stored XSS. This issue affects WP Keyword Monitor: from n/a through 1.0.5.
Title WordPress WP Keyword Monitor Plugin <=1.0.5 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:34.962Z

Reserved: 2025-02-03T13:34:11.344Z

Link: CVE-2025-25088

cve-icon Vulnrichment

Updated: 2025-02-07T14:56:44.117Z

cve-icon NVD

Status : Deferred

Published: 2025-02-07T10:15:14.260

Modified: 2026-04-23T15:25:33.157

Link: CVE-2025-25088

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T17:15:21Z

Weaknesses