Description
Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author post-author allows Stored XSS.This issue affects Post Author: from n/a through <= 1.1.1.
Published: 2025-06-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Post Author plugin for WordPress contains a CSRF vulnerability that permits an attacker to inject malicious JavaScript into stored content. If an authenticated or, if CSRF protections are absent, an unauthenticated user crafts a request, the plugin may save and render arbitrary script into a page. The compromised page would then execute the script in the context of any visitor, potentially leaking credentials or hijacking sessions. This is a classic example of CWE‑352 combined with stored XSS, enabling persistent cross‑site attacks.

Affected Systems

WordPress sites running the Post Author plugin version 1.1.1 or earlier. The plugin is authored by David Shabtai and appears under the name “Post Author” in the WordPress plugin repository. No specific WordPress core version is mentioned; the issue applies to any WordPress installation hosting these plugin versions.

Risk and Exploitability

The CVSS score of 7.1 reflects moderate‑to‑high severity. The EPSS score of less than 1% suggests that, as of this analysis, exploitation attempts are rare, and there is no evidence of widespread attacks. The vulnerability is not listed in the CISA KEV catalog, reinforcing that it has not yet been widely abused. Based on the description, it is inferred that the likely attack path involves a visitor who is an authenticated user (for example, a site administrator) being tricked into submitting a crafted request, or a breached account used to insert malicious code that persists across the site. Given the CSRF nature, an attacker who can get a legitimate user to click a link or load a malicious page could trigger the exploit. Overall risk is moderate, but the potential impact of stored XSS is high enough to warrant prompt remediation.

Generated by OpenCVE AI on May 2, 2026 at 11:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Post Author plugin to the latest available version or uninstall it if an update is not available.
  • If an update is not immediately possible, deactivate the Post Author plugin to remove the vulnerability.
  • Apply a CSRF protection measure, such as adding an anti‑CSRF token or using a security plugin that enforces it, to mitigate potential exploitation while the plugin is disabled or updated.

Generated by OpenCVE AI on May 2, 2026 at 11:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17167 Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1. Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author post-author allows Stored XSS.This issue affects Post Author: from n/a through <= 1.1.1.
Title WordPress Post Author <= 1.1.1 - Cross Site Request Forgery (CSRF) Vulnerability WordPress Post Author plugin <= 1.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 06 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in David Shabtai Post Author allows Stored XSS. This issue affects Post Author: from n/a through 1.1.1.
Title WordPress Post Author <= 1.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:51.690Z

Reserved: 2025-03-11T08:10:12.306Z

Link: CVE-2025-28950

cve-icon Vulnrichment

Updated: 2025-06-06T14:57:22.230Z

cve-icon NVD

Status : Deferred

Published: 2025-06-06T13:15:27.903

Modified: 2026-04-23T15:26:39.750

Link: CVE-2025-28950

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:15:19Z

Weaknesses