Description
Cross-Site Request Forgery (CSRF) vulnerability in dimafreund Rentsyst rentsyst allows Stored XSS.This issue affects Rentsyst: from n/a through <= 2.0.92.
Published: 2025-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Rentsyst plugin for WordPress contains a Cross‑Site Request Forgery entry point that allows an attacker who is able to forge a request on behalf of an authenticated user to inject a script that is stored in the website. When other logged‑in users request the affected page, the malicious script executes in their browsers, enabling the attacker to steal session cookies, deface content, or perform further actions. This stored XSS flaw can increase the impact to customers’ confidentiality and integrity.

Affected Systems

WordPress plugin 'Rentsyst' by dimafreund. The vulnerability exists in all releases up to and including version 2.0.92. Versions beyond 2.0.92 are not affected.

Risk and Exploitability

The patch is rated with a CVSS score of 7.1, indicating high severity, while the EPSS score is under 1%, implying a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack requires an authenticated user to submit a forged request, and the stored script then runs in the victim’s browser when subsequent pages are loaded. The impact is high if successful, but the likelihood is considered low due to the EPSS score.

Generated by OpenCVE AI on April 30, 2026 at 23:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Rentsyst plugin to version 2.0.93 or later
  • If an immediate update is not possible, suspend or remove the plugin to eliminate the attack surface
  • Implement WordPress best practices for CSRF protection, including using nonces and strict referer checks

Generated by OpenCVE AI on April 30, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10599 Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS.This issue affects RentSyst: from n/a through 2.0.92.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS.This issue affects RentSyst: from n/a through 2.0.92. Cross-Site Request Forgery (CSRF) vulnerability in dimafreund Rentsyst rentsyst allows Stored XSS.This issue affects Rentsyst: from n/a through <= 2.0.92.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 11 Jun 2025 16:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS. This issue affects RentSyst: from n/a through 2.0.72. Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS.This issue affects RentSyst: from n/a through 2.0.92.
Title WordPress RentSyst plugin <= 2.0.72 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability WordPress RentSyst plugin <= 2.0.92 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability

Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS. This issue affects RentSyst: from n/a through 2.0.72.
Title WordPress RentSyst plugin <= 2.0.72 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:22.976Z

Reserved: 2025-04-09T11:19:20.928Z

Link: CVE-2025-32501

cve-icon Vulnrichment

Updated: 2025-04-09T17:41:07.603Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:43.820

Modified: 2026-04-23T15:28:59.833

Link: CVE-2025-32501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:00:05Z

Weaknesses