Description
The Audio Comments Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the 'audio-comments/audior-settings.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-05-17
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting via CSRF
Action: Upgrade Plugin
AI Analysis

Impact

The Audio Comments Plugin for WordPress is vulnerable to Cross‑Site Request Forgery in all versions up to 1.0.4. Missing or incorrect nonce validation on the settings page allows an unauthenticated attacker to perform a forged request that updates plugin settings and injects malicious web scripts. The injected scripts are stored and executed in the context of the site, potentially compromising confidentiality, integrity, or availability for visitors who view the page.

Affected Systems

Vendors: naicuoctavian. Product: Audio Comments Plugin. All releases version 1.0.4 and earlier are affected; the vulnerability is present in every build up to and including 1.0.4.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score of < 1% shows a low but nonzero likelihood of exploitation in the near term. The vulnerability is not currently listed in CISA KEV. Exploitation requires an attacker to trick a site administrator into accessing the settings page, most likely by enticing them to click a crafted link or form. Once the forged request succeeds, the attacker can store arbitrary script payloads that will run on subsequent page loads, enabling defacement, credential theft, or further malware distribution.

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Audio Comments Plugin to a version that implements proper nonce validation or remove the plugin if no patch is available
  • If no update exists, limit access to the plugin’s settings page so that only legitimate administrators can make changes and disable the ability to modify settings via non‑authenticated requests
  • Deploy a web application firewall rule that blocks requests to /audio-comments/audior-settings.php lacking a valid nonce or containing suspicious script payloads

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15558 The Audio Comments Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the 'audio-comments/audior-settings.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 17 May 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Audio Comments Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the 'audio-comments/audior-settings.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Audio Comments Plugin <= 1.0.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:32.590Z

Reserved: 2025-05-01T13:00:30.855Z

Link: CVE-2025-4189

cve-icon Vulnrichment

Updated: 2025-05-19T15:39:33.217Z

cve-icon NVD

Status : Deferred

Published: 2025-05-17T04:16:19.027

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:00:35Z

Weaknesses