Description
The Anti-Spam: Spam Protection | Block Spam Users, Comments, Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2024.7. This is due to missing or incorrect nonce validation in the 'ss_option_maint.php' and 'ss_user_filter_list' files. This makes it possible for unauthenticated attackers to delete pending comments, and re-enable a previously blocked user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-06-06
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Apply Patch
AI Analysis

Impact

The WordPress plugin Anti‑Spam: Spam Protection | Block Spam Users, Comments, Forms is vulnerable to CSRF because it does not validate nonces in key administrative files. An attacker who can trick an administrator into clicking a crafted link can cause the site to delete pending comments or re‑enable a previously blocked user. The weakness, identified as CWE‑352, undermines integrity and availability of content moderation features and allows an unauthenticated user to influence site state.

Affected Systems

The vendor webguyio publishes the Stop Spammers Classic plugin. All versions up to and including version 2024.7 are affected; the vulnerability is present in the ss_option_maint.php and ss_user_filter_list files of those releases.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. The EPSS score of <1% means that observed exploitation risk is very low, and the issue is not listed in the CISA KEV catalog. The most likely attack vector is a CSRF request that requires the victim administrator to unknowingly approve an action, such as clicking a link, and the vulnerability does not grant additional privileges beyond those of the target administrator.

Generated by OpenCVE AI on April 20, 2026 at 22:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Stop Spammers Classic plugin version that corrects the nonce validation flaw.
  • If an update is not yet available, temporarily disable the plugin until a fix is released to prevent further compromised actions.
  • Restrict administrative access to trusted IP addresses or employ two‑factor authentication to reduce the chance that an administrator unknowingly follows a forged request.

Generated by OpenCVE AI on April 20, 2026 at 22:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17072 The Anti-Spam: Spam Protection | Block Spam Users, Comments, Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2024.7. This is due to missing or incorrect nonce validation in the 'ss_option_maint.php' and 'ss_user_filter_list' files. This makes it possible for unauthenticated attackers to delete pending comments, and re-enable a previously blocked user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 18:30:00 +0000


Fri, 06 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Anti-Spam: Spam Protection | Block Spam Users, Comments, Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2024.7. This is due to missing or incorrect nonce validation in the 'ss_option_maint.php' and 'ss_user_filter_list' files. This makes it possible for unauthenticated attackers to delete pending comments, and re-enable a previously blocked user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Anti-Spam: Spam Protection | Block Spam Users, Comments, Forms <= 2024.7 - Cross-Site Request Forgery to Multiple Administrative Actions
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:28.106Z

Reserved: 2025-03-28T17:21:18.792Z

Link: CVE-2025-2935

cve-icon Vulnrichment

Updated: 2025-06-06T15:42:33.250Z

cve-icon NVD

Status : Deferred

Published: 2025-06-06T07:15:24.823

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses