Description
Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam Byebye spam-byebye allows Cross Site Request Forgery.This issue affects Spam Byebye: from n/a through <= 2.2.4.
Published: 2025-03-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery vulnerability exists in the WordPress Spam Byebye plugin that allows an attacker to craft a malicious request that is sent in the context of an authenticated user. The flaw permits the execution of privileged actions on the site, potentially modifying content, deleting posts, or changing plugin settings. This weakness is classified as CWE‑352 and could compromise the integrity of the WordPress installation if an attacker can convince a logged‑in administrator to visit a malicious site.

Affected Systems

The issue affects the Spam Byebye plugin from the ohtan vendor, versions up to and including 2.2.4. System administrators should verify whether their WordPress site is running any of those versions and plan for an upgrade.

Risk and Exploitability

The CVSS score of 4.3 reflects a moderate risk, and the EPSS score of < 1% indicates a low likelihood that the flaw will be actively exploited. The vulnerability is not listed in CISA’s KEV catalog, suggesting it has not yet been observed in the wild. Inferred attack vectors involve a malicious site or infected page that submits a crafted request while a legitimate user is authenticated. Successful exploitation would require the victim to be logged in with sufficient privileges for the desired action. Consequently, mitigation should prioritize preventing the plugin from processing unauthorized requests and ensuring that only legitimate user actions are accepted.

Generated by OpenCVE AI on May 1, 2026 at 13:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Spam Byebye plugin to version 2.2.5 or later to patch the CSRF flaw.
  • If an upgrade is not immediately possible, temporarily deactivate the Spam Byebye plugin to eliminate the vulnerable endpoint.
  • If the plugin must remain active, implement an additional nonce or CSRF token check on any state‑changing actions, and restrict access to privileged operations to authenticated administrators only.

Generated by OpenCVE AI on May 1, 2026 at 13:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7887 Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam Byebye allows Cross Site Request Forgery. This issue affects Spam Byebye: from n/a through 2.2.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam Byebye allows Cross Site Request Forgery. This issue affects Spam Byebye: from n/a through 2.2.4. Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam Byebye spam-byebye allows Cross Site Request Forgery.This issue affects Spam Byebye: from n/a through <= 2.2.4.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00021}

epss

{'score': 0.00029}


Wed, 12 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam Byebye allows Cross Site Request Forgery. This issue affects Spam Byebye: from n/a through 2.2.4.
Title WordPress SPAM-BYBYE Plugin <= 2.2.4 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:51.508Z

Reserved: 2025-03-11T08:10:05.094Z

Link: CVE-2025-28941

cve-icon Vulnrichment

Updated: 2025-03-12T14:24:25.302Z

cve-icon NVD

Status : Deferred

Published: 2025-03-11T21:15:52.030

Modified: 2026-04-23T15:26:38.767

Link: CVE-2025-28941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T14:00:15Z

Weaknesses