Description
The 4stats plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the stats/stats.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-05-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS via CSRF
Action: Patch
AI Analysis

Impact

The 4stats WordPress plugin is prone to Cross‑Site Request Forgery because it fails to validate nonces on the stats/stats.php page. This flaw allows an unauthenticated attacker to trick an administrator into submitting a forged request, altering the plugin’s settings and remotely injecting malicious JavaScript. The injected script is stored in the plugin’s configuration and executed on subsequent page loads, giving the attacker persistent cross‑site scripting that can compromise the confidentiality and integrity of the site, deface content, or conduct phishing.

Affected Systems

The vulnerability affects the 4stats plugin for WordPress, versions up to and including 2.0.9. The plugin is hosted in the WordPress repository and can be installed on any WordPress site regardless of hosting environment.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity exploit due to the requirement of an administrator being tricked into performing an action; the EPSS score of less than 1% indicates that exploitation is currently unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet, but the combination of CSRF and stored XSS makes it a attractive target for attackers. An attacker would need to obtain an authenticated session or persuade an administrator to visit a malicious link; once the payload is stored, any visitor to the affected WordPress site would load the malicious script.

Generated by OpenCVE AI on April 21, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the 4stats plugin to the latest available version where nonce validation is correctly implemented; if no newer release exists, consider removing the plugin until a patch is released.
  • Until a patch is available, restrict the plugin’s settings to trusted administrators only and monitor for unexpected configuration changes.
  • Deploy a web application firewall or a security plugin such as Wordfence to block malformed POST requests to stats/stats.php and to sanitize stored configuration data against XSS.

Generated by OpenCVE AI on April 21, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27939 The 4stats plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the stats/stats.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Sat, 24 May 2025 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 24 May 2025 03:00:00 +0000

Type Values Removed Values Added
Description The 4stats plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the stats/stats.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title 4stats <= 2.0.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:32.037Z

Reserved: 2025-04-22T14:51:57.874Z

Link: CVE-2025-3869

cve-icon Vulnrichment

Updated: 2025-05-24T10:10:05.294Z

cve-icon NVD

Status : Deferred

Published: 2025-05-24T03:15:23.377

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:45:25Z

Weaknesses