Description
Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating simple-rating allows Stored XSS.This issue affects Simple Rating: from n/a through <= 1.4.
Published: 2025-03-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Simple Rating plugin allows a malicious actor to trick a victim into submitting a forged request that stores malicious JavaScript code on the site. Once the payload is stored, any user visiting the affected page will execute the script in their browser, potentially compromising user sessions, stealing credentials, or defacing content. The weakness is a classic CSRF that leads to stored XSS, represented by CWE-352.

Affected Systems

The flaw appears in all releases of Igor Yavych’s Simple Rating plugin up to and including version 1.4. Sites running the plugin in those versions are at risk; the issue does not affect later releases beyond 1.4.

Risk and Exploitability

With a CVSS score of 7.1 the vulnerability is considered high severity. The EPSS score of less than 1% suggests that recent exploitation is unlikely, and the issue is not listed in CISA’s KEV catalog. Nonetheless, the combination of CSRF and stored XSS offers an attack path where an unsuspecting user can be made to load the site with a forged request, after which the injected script runs with the victim’s privileges. The risk is heightened on sites where the rating feature is openly accessible to unauthenticated visitors.

Generated by OpenCVE AI on May 1, 2026 at 13:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Simple Rating to the latest release that removes the CSRF and stored XSS flaw (e.g., version 1.5 or later if available).
  • Disable or restrict rating submissions to authenticated or trusted users only, either through the plugin settings or by adding custom code that blocks public submissions until a patch is applied.
  • Apply a site‑wide Content Security Policy that disallows inline scripts and whitelists only trusted script sources to mitigate the impact of any residual XSS payloads.

Generated by OpenCVE AI on May 1, 2026 at 13:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7935 Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4. Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating simple-rating allows Stored XSS.This issue affects Simple Rating: from n/a through <= 1.4.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Mon, 31 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4.
Title WordPress Simple Rating plugin <= 1.4 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:54.560Z

Reserved: 2025-03-24T13:00:15.939Z

Link: CVE-2025-30572

cve-icon Vulnrichment

Updated: 2025-03-31T18:21:41.433Z

cve-icon NVD

Status : Deferred

Published: 2025-03-24T14:15:29.217

Modified: 2026-04-23T15:26:53.347

Link: CVE-2025-30572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T13:45:06Z

Weaknesses