Description
Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email no-disposable-email allows Stored XSS.This issue affects No Disposable Email: from n/a through <= 2.5.1.
Published: 2025-03-11
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The No Disposable Email plugin for WordPress contains a CSRF vulnerability that permits an attacker to insert arbitrary JavaScript into the site’s stored content. The stored XSS can execute when ordinary site visitors load the affected page, enabling session hijacking, defacement, or malicious redirects. This flaw originates from missing CSRF protection during form submissions that modify stored data, allowing an unprivileged user to inject script payloads.

Affected Systems

Any WordPress site that has installed the No Disposable Email plugin version 2.5.1 or earlier is vulnerable. The plugin is distributed by a developer under the name philippe, and the issue applies to all releases from the first version to 2.5.1. Sites running later versions are presumably unaffected.

Risk and Exploitability

With a CVSS score of 7.1, the vulnerability is considered high impact. The EPSS score of less than 1% indicates a low current exploitation probability, and the vulnerability is not present in CISA’s KEV catalog. An attacker most likely would deliver a malicious link or email that, when opened by a site administrator, performs a CSRF request to the plugin’s update endpoint, thereby storing malicious script. The attack requires the victim to have sufficient privileges to process the stored content, but does not need elevated rights beyond normal content management roles.

Generated by OpenCVE AI on May 1, 2026 at 13:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update No Disposable Email to the latest stable version that removes the CSRF flaw
  • If an update is not available, disable or uninstall the No Disposable Email plugin to eliminate the attack vector
  • Configure your WordPress installation to enforce CSRF tokens on all forms, ensuring the plugin follows best practices
  • Regularly audit stored posts, pages, or custom post types for unexpected JavaScript code, particularly if the plugin was previously installed

Generated by OpenCVE AI on May 1, 2026 at 13:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7874 Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email allows Stored XSS. This issue affects No Disposable Email: from n/a through 2.5.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email allows Stored XSS. This issue affects No Disposable Email: from n/a through 2.5.1. Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email no-disposable-email allows Stored XSS.This issue affects No Disposable Email: from n/a through <= 2.5.1.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0002}

epss

{'score': 0.00031}


Wed, 12 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email allows Stored XSS. This issue affects No Disposable Email: from n/a through 2.5.1.
Title WordPress No Disposable Email plugin <= 2.5.1 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:50.926Z

Reserved: 2025-03-11T08:09:40.253Z

Link: CVE-2025-28923

cve-icon Vulnrichment

Updated: 2025-03-12T13:44:21.237Z

cve-icon NVD

Status : Deferred

Published: 2025-03-11T21:15:50.087

Modified: 2026-04-23T15:26:36.637

Link: CVE-2025-28923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T14:00:15Z

Weaknesses