Description
Cross-Site Request Forgery (CSRF) vulnerability in IP2Location IP2Location World Clock ip2location-world-clock allows Stored XSS.This issue affects IP2Location World Clock: from n/a through <= 1.1.9.
Published: 2025-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery that leads to stored cross‑site scripting. A malicious actor can trick an authenticated WordPress user into performing an action that stores user‑controlled data in the IP2Location World Clock plugin. Once stored, the data is executed by other users browsing the affected pages, enabling session hijacking, cookie theft, or other client‑side attacks.

Affected Systems

The issue affects the IP2Location World Clock WordPress plugin, versions from the earliest releases up to and including 1.1.9. Any WordPress installation running this plugin is potentially vulnerable.

Risk and Exploitability

The CVSS base score of 7.1 indicates moderate to high severity. EPSS less than 1% suggests low probability of exploitation, and the vulnerability is not listed in CISA's KEV catalog. Exploitation requires an authenticated session with the capability to submit plugin data, so the likely attack vector is a logged‑in user who falls victim to a CSRF attack. The attacker does not need to exploit server‑side code directly; the impact manifests through client‑side script execution.

Generated by OpenCVE AI on May 1, 2026 at 10:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the IP2Location World Clock plugin to the latest version that includes the patch for this issue.
  • If an upgrade cannot be performed immediately, remove or disable the plugin to prevent further exploitation.
  • Deploy a web application firewall rule that blocks POST requests to the plugin’s configuration endpoint that contain potentially malicious script content.

Generated by OpenCVE AI on May 1, 2026 at 10:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10576 Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location World Clock allows Stored XSS. This issue affects IP2Location World Clock: from n/a through 1.1.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location World Clock allows Stored XSS. This issue affects IP2Location World Clock: from n/a through 1.1.9. Cross-Site Request Forgery (CSRF) vulnerability in IP2Location IP2Location World Clock ip2location-world-clock allows Stored XSS.This issue affects IP2Location World Clock: from n/a through <= 1.1.9.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location World Clock allows Stored XSS. This issue affects IP2Location World Clock: from n/a through 1.1.9.
Title WordPress IP2Location World Clock Plugin <= 1.1.9 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:26.352Z

Reserved: 2025-04-09T11:20:57.810Z

Link: CVE-2025-32644

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:49.917

Modified: 2026-04-23T15:29:16.277

Link: CVE-2025-32644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T11:00:15Z

Weaknesses