Description
Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle cackle allows Cross Site Request Forgery.This issue affects Cackle: from n/a through <= 4.33.
Published: 2025-03-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

WordPress Cackle plugin versions up to 4.33 contain a CSRF flaw that can let an attacker craft a request that is executed with the privileges of a logged‑in user. The vulnerability is a classic Cross‑Site Request Forgery, meaning the attacker does not need to bypass authentication but can force the victim to perform actions such as changing plugin settings or initiating other privileged operations. The impact depends on the user’s role but can lead to matter of data alteration or configuration changes within the site.

Affected Systems

The affected product is the Cackle WordPress plugin from vendor boroV, specifically all released versions up to and including 4.33. No specific sub‑versions are listed beyond this upper bound.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk level. The EPSS score of less than 1% shows a very low probability of exploitation at this time, and the vulnerability is not listed in CISA’s KEV catalogue. The likely attack vector involves a crafted HTTP request to the plugin’s endpoint checked by an authenticated browser session; it requires that the victim is logged in and that the plugin’s CSRF checks are absent or ineffective. The exploitation conditions are therefore that a user with sufficient privileges visits a malicious link or submits a forged form while the vulnerable plugin is active.

Generated by OpenCVE AI on May 1, 2026 at 04:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Cackle to the latest available version that addresses the issue.
  • If an update is not feasible, disable or uninstall the Cackle plugin to prevent the CSRF vector.
  • As an interim measure, add server‑side checks such as nonce validation or restrict the vulnerable endpoints to users with elevated privileges, ensuring that requests include a valid CSRF token.

Generated by OpenCVE AI on May 1, 2026 at 04:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7973 Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle allows Cross Site Request Forgery. This issue affects Cackle: from n/a through 4.33.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle allows Cross Site Request Forgery. This issue affects Cackle: from n/a through 4.33. Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle cackle allows Cross Site Request Forgery.This issue affects Cackle: from n/a through <= 4.33.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in boroV Cackle allows Cross Site Request Forgery. This issue affects Cackle: from n/a through 4.33.
Title WordPress Cackle plugin <= 4.33 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:53.928Z

Reserved: 2025-03-24T12:59:49.933Z

Link: CVE-2025-30546

cve-icon Vulnrichment

Updated: 2025-03-24T14:50:19.247Z

cve-icon NVD

Status : Deferred

Published: 2025-03-24T14:15:23.820

Modified: 2026-04-23T15:26:50.353

Link: CVE-2025-30546

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T04:45:08Z

Weaknesses