Description
Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications custom-comment-notifications allows Stored XSS.This issue affects Custom Comment Notifications: from n/a through <= 1.0.8.
Published: 2025-02-07
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw that allows an attacker to inject malicious JavaScript into the plugin’s stored comment notifications. By forging an authenticated request, the attacker can persist a script that is executed when an administrator subsequently views the affected page, enabling session hijack, defacement, or credential theft. The attack requires the attacker to supply a forged request and rely on an existing administrator session to store the payload.

Affected Systems

All installations of the scweber Custom Comment Notifications plugin running version 1.0.8 or earlier on WordPress hosts are affected. The plugin is commonly used in sites that manage comment moderation or notification workflows.

Risk and Exploitability

With a CVSS score of 7.1, the flaw presents a medium‑to‑high risk level. The EPSS score of less than 1% indicates a low probability of exploitation in the wild at present, and the vulnerability is not listed in the CISA KEV catalog, meaning no known widespread attacks have been reported. The attacker would need to target an administrator or a user with the ability to trigger the vulnerable action, typically by embedding a malicious link that submits the forged request. Once the stored script runs in the admin browser context, the attacker gains full control over the victim’s session and can execute arbitrary JavaScript.

Generated by OpenCVE AI on May 2, 2026 at 04:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch or upgrade the Custom Comment Notifications plugin to a version newer than 1.0.8.
  • If the update cannot be applied immediately, limit the use of the notification feature to a minimal set of trusted administrators to reduce exposure.
  • Enforce anti‑replay tokens on any form actions within the plugin and verify the token server‑side before processing the request.
  • Ensure that all comment notification content is properly escaped before rendering, using WordPress’s escaping functions such as esc_html or wp_kses to prevent stored XSS.

Generated by OpenCVE AI on May 2, 2026 at 04:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4063 Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications allows Stored XSS. This issue affects Custom Comment Notifications: from n/a through 1.0.8.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications allows Stored XSS. This issue affects Custom Comment Notifications: from n/a through 1.0.8. Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications custom-comment-notifications allows Stored XSS.This issue affects Custom Comment Notifications: from n/a through <= 1.0.8.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 12 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 10:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in scweber Custom Comment Notifications allows Stored XSS. This issue affects Custom Comment Notifications: from n/a through 1.0.8.
Title WordPress Custom Comment Notifications plugin <= 1.0.8 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:36.812Z

Reserved: 2025-02-03T13:35:19.028Z

Link: CVE-2025-25154

cve-icon Vulnrichment

Updated: 2025-02-12T20:44:18.879Z

cve-icon NVD

Status : Deferred

Published: 2025-02-07T10:15:21.120

Modified: 2026-04-23T15:25:42.727

Link: CVE-2025-25154

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T04:45:34Z

Weaknesses