Description
Cross-Site Request Forgery (CSRF) vulnerability in arkapravamajumder Back To Top backtotop allows Cross Site Request Forgery.This issue affects Back To Top: from n/a through <= 2.0.
Published: 2025-03-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Back To Top WordPress plugin up to version 2.0 contains a Cross‑Site Request Forgery flaw that permits an attacker to trick a logged‑in user into performing actions on the site. The flaw is present in the backtotop component and can be triggered when an external site submits a request that inherits the victim’s authentication cookies. If an attacker controls the target action, they could modify site content, change settings, or trigger undesired operations, thereby compromising the integrity of the site.

Affected Systems

WordPress sites running the Back To Top plugin version 2.0 or earlier, specifically the product listed by the CNA as arkapravamajumder Back To Top.

Risk and Exploitability

This vulnerability is scored with a CVSS of 4.3 and an EPSS below 1%, indicating a moderate severity but low exploitation probability. It is not currently listed in the CISA KEV catalog. The attack vector is presumed to be network‑based, requiring the victim to be logged in and a third‑party page to be viewed. Because CSRF relies on user credentials, the risk is limited to authenticated users but could have significant impact on the affected site’s integrity.

Generated by OpenCVE AI on May 1, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Back To Top plugin to a version newer than 2.0 to eliminate the CSRF flaw.
  • Verify that the site operates under HTTPS to reduce cookie theft risk.
  • If an update is not immediately possible, disable the plugin or restrict its usage to trusted admin users only.

Generated by OpenCVE AI on May 1, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7886 Cross-Site Request Forgery (CSRF) vulnerability in arkapravamajumder Back To Top allows Cross Site Request Forgery. This issue affects Back To Top: from n/a through 2.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in arkapravamajumder Back To Top allows Cross Site Request Forgery. This issue affects Back To Top: from n/a through 2.0. Cross-Site Request Forgery (CSRF) vulnerability in arkapravamajumder Back To Top backtotop allows Cross Site Request Forgery.This issue affects Back To Top: from n/a through <= 2.0.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00021}

epss

{'score': 0.00029}


Wed, 12 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in arkapravamajumder Back To Top allows Cross Site Request Forgery. This issue affects Back To Top: from n/a through 2.0.
Title WordPress Back To Top Plugin <= 2.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:51.423Z

Reserved: 2025-03-11T08:10:05.094Z

Link: CVE-2025-28940

cve-icon Vulnrichment

Updated: 2025-03-12T13:43:50.975Z

cve-icon NVD

Status : Deferred

Published: 2025-03-11T21:15:51.887

Modified: 2026-04-23T15:26:38.657

Link: CVE-2025-28940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T14:00:15Z

Weaknesses