Description
Cross-Site Request Forgery (CSRF) vulnerability in Aurélien LWS LWS SMS lws-sms allows Cross Site Request Forgery.This issue affects LWS SMS: from n/a through <= 2.4.1.
Published: 2025-03-28
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The LWS SMS plugin for WordPress contains a Cross‑Site Request Forgery vulnerability that allows an attacker to force a logged‑in user to submit forged requests to the plugin. The plugin lacks the necessary CSRF tokens on its sensitive endpoints, as inferred from the description that the flaw "allows Cross Site Request Forgery." If exploited, the attacker could trigger any operation that the authenticated user is permitted to perform, such as altering plugin settings or sending messages, although the exact actions are not specified in the advisory.

Affected Systems

Versions of the LWS SMS plugin up to and including 2.4.1 are affected, as stated by the vendor. No later releases are noted, and earlier revisions are considered unimpacted by the current information.

Risk and Exploitability

The vulnerability is rated with a CVSS score of 5.4, placing it in the moderate risk range. Its EPSS score is reported as less than 1%, indicating a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, further suggesting that active exploitation is unlikely at present. The likely attack vector is that an attacker would target a legitimate user with a crafted URL or form that could be embedded in a malicious page; this is inferred from the nature of CSRF attacks. Given the moderate severity and low exploitation probability, the risk is manageable but still warrants timely remediation to prevent potential misuse.

Generated by OpenCVE AI on May 1, 2026 at 12:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the LWS SMS plugin to version 2.4.2 or later, which removes the CSRF weakness.
  • If an upgraded version is not available, immediately disable the LWS SMS plugin to eliminate the attack surface for authenticated users.
  • Implement access restrictions on the WordPress admin area, such as IP whitelisting or two‑factor authentication, to reduce the chance that a logged‑in user becomes a victim of a forged request.

Generated by OpenCVE AI on May 1, 2026 at 12:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8598 Cross-Site Request Forgery (CSRF) vulnerability in Aurélien LWS LWS SMS allows Cross Site Request Forgery. This issue affects LWS SMS: from n/a through 2.4.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Aurélien LWS LWS SMS allows Cross Site Request Forgery. This issue affects LWS SMS: from n/a through 2.4.1. Cross-Site Request Forgery (CSRF) vulnerability in Aurélien LWS LWS SMS lws-sms allows Cross Site Request Forgery.This issue affects LWS SMS: from n/a through <= 2.4.1.
Title WordPress LWS SMS <= 2.4.1 - Cross Site Request Forgery (CSRF) Vulnerability WordPress LWS SMS plugin <= 2.4.1 - Cross Site Request Forgery (CSRF) Vulnerability
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Fri, 28 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Aurélien LWS LWS SMS allows Cross Site Request Forgery. This issue affects LWS SMS: from n/a through 2.4.1.
Title WordPress LWS SMS <= 2.4.1 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:07.529Z

Reserved: 2025-03-28T11:00:51.876Z

Link: CVE-2025-31457

cve-icon Vulnrichment

Updated: 2025-03-28T13:31:03.284Z

cve-icon NVD

Status : Deferred

Published: 2025-03-28T12:15:18.393

Modified: 2026-04-23T15:27:51.800

Link: CVE-2025-31457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T12:30:17Z

Weaknesses