Description
Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro cas-maestro allows Stored XSS.This issue affects CAS Maestro: from n/a through <= 1.1.3.
Published: 2025-03-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw that allows an attacker to inject and store malicious scripts into the CAS Maestro plugin’s content. Once stored, the script executes within the context of any user who views the affected content, potentially compromising session data, defacing the site, or facilitating further phishing attacks. The weakness is reflected in the CWE‑352 designation, indicating a lack of proper anti‑CSRF validation during data processing.

Affected Systems

Any WordPress installation that has the CAS Maestro plugin from the earliest release up to and including version 1.1.3. The plugin’s author is Henrique Mouta, and the vulnerability applies to all affected releases of this plugin installed on a WordPress site.

Risk and Exploitability

The CVSS score of 7.1 classifies this flaw as a high‑severity issue. The EPSS score is below 1 %, indicating a low but non‑zero probability of exploitation. The flaw is not listed in the CISA KEV catalog. Attackers can exploit the CSRF vector by persuading an authenticated user, such as an administrator, to visit a malicious link or submit a crafted form that injects the malicious payload. Because the payload is stored, the impact persists until the content is removed or patched.

Generated by OpenCVE AI on May 1, 2026 at 04:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the CAS Maestro plugin to the latest released version, which resolves the CSRF protection bug.
  • If an update is unavailable, remove the plugin from the WordPress installation to eliminate the attack surface.
  • Implement strict role‑based access controls and consider two‑factor authentication for administrative users to reduce the chance that a legitimate user will be tricked into submitting malicious content.

Generated by OpenCVE AI on May 1, 2026 at 04:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7955 Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3. Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro cas-maestro allows Stored XSS.This issue affects CAS Maestro: from n/a through <= 1.1.3.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3.
Title WordPress CAS Maestro plugin <= 1.1.3 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:54.119Z

Reserved: 2025-03-24T13:00:07.995Z

Link: CVE-2025-30561

cve-icon Vulnrichment

Updated: 2025-03-24T14:49:49.733Z

cve-icon NVD

Status : Deferred

Published: 2025-03-24T14:15:27.460

Modified: 2026-04-23T15:26:52.210

Link: CVE-2025-30561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T04:45:08Z

Weaknesses