Description
Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster microblog-poster allows Stored XSS.This issue affects Microblog Poster: from n/a through <= 2.1.6.
Published: 2025-03-28
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a CSRF flaw that allows an attacker to submit a crafted request to the Microblog Poster plugin, which then records the attacker’s payload as part of a microblog post. This stored payload is rendered on the site without sanitization, giving attackers a persistent XSS vector. An attacker could run any JavaScript in the context of users who view the malicious post, potentially stealing credentials, session cookies, or defacing the blog. This weakness is identified as CWE-352 in the CVE data.

Affected Systems

The Microblog Poster plugin from Efficient Scripts, versions up to 2.1.6, are affected. The plugin is available for WordPress sites; any installation of an affected version, from the earliest available until 2.1.6 inclusive, is vulnerable. Unspecified lower bound (n/a) indicates all earlier builds. No other WordPress components are mentioned.

Risk and Exploitability

The CVSS score of 7.1 places the issue in the high severity range, yet the EPSS score is below 1%, suggesting few public exploits yet. It is not part of the CISA KEV catalog. The likely attack path requires the target to have an authenticated session with the plugin enabled; a visitor tricked into clicking a link could trigger the CSRF, letting the attacker embed malicious code that is then stored on the site. Attackers would benefit from a site with a sizable user base or from administrative access. Because the plugin stores untrusted input without proper encoding, any user who views the affected post can be impacted.

Generated by OpenCVE AI on May 1, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Microblog Poster plugin to the latest version that includes the CSRF‑to‑XSS fix.
  • If a newer version is not available, disable or remove the plugin from the site until a patch is released.
  • Ensure that any content submitted via the plugin is passed through WordPress’ sanitization functions such as wp_kses_post before rendering to prevent stored XSS.

Generated by OpenCVE AI on May 1, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8612 Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster allows Stored XSS. This issue affects Microblog Poster: from n/a through 2.1.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster allows Stored XSS. This issue affects Microblog Poster: from n/a through 2.1.6. Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster microblog-poster allows Stored XSS.This issue affects Microblog Poster: from n/a through <= 2.1.6.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 28 Mar 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster allows Stored XSS. This issue affects Microblog Poster: from n/a through 2.1.6.
Title WordPress Microblog Poster plugin <= 2.1.6 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:07.063Z

Reserved: 2025-03-28T11:00:31.358Z

Link: CVE-2025-31435

cve-icon Vulnrichment

Updated: 2025-03-28T12:34:21.412Z

cve-icon NVD

Status : Deferred

Published: 2025-03-28T12:15:16.183

Modified: 2026-04-23T15:27:49.293

Link: CVE-2025-31435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T03:30:07Z

Weaknesses