Description
The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-05-17
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via CSRF
Action: Immediate Update
AI Analysis

Impact

The AlT Monitoring plugin for WordPress fails to validate nonces on the admin edit page, enabling an unauthenticated attacker to forge a request that updates the settings. Once the admin is tricked into submitting the forged request, malicious scripts can be injected into the plugin settings and subsequently executed in the browsers of any visitor to the site, leading to stored cross‑site scripting. The vulnerability itself is a classic CSRF condition exploiting missing or incorrect protection on a state‑changing endpoint.

Affected Systems

WordPress sites that have installed AlT Monitoring version 1.0.3 or earlier. The plugin is distributed by the vendor alti5 and is installed as a standard WordPress plugin.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests the probability of active exploitation is low at the moment. The vulnerability is not listed in CISA KEV, and because an attacker can inject scripts that execute in visitors' browsers, the primary threat is stored cross‑site scripting. The path of exploitation requires user interaction – the target admin must click a link or button that contains the forged request – which, once executed, can lead to potential confidentiality and integrity impacts (inferred) because injected scripts could exfiltrate data or alter displayed content.

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AlT Monitoring plugin to the latest version that includes the CSRF validation fix.
  • If a patch is not yet available, disable the plugin or restrict its use to the most trusted administrators until the fix is applied.
  • Add site‑wide anti‑CSRF measures such as enforcing valid nonces on all admin actions, or employ a security plugin that checks for CSRF tokens.
  • Regularly review WordPress security advisories for this plugin and apply any new patches as soon as they are released.

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15557 The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 17 May 2025 03:45:00 +0000

Type Values Removed Values Added
Description The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title AlT Monitoring <= 1.0.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:37.471Z

Reserved: 2025-05-01T13:10:20.872Z

Link: CVE-2025-4194

cve-icon Vulnrichment

Updated: 2025-05-19T15:39:07.023Z

cve-icon NVD

Status : Deferred

Published: 2025-05-17T04:16:20.320

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:00:35Z

Weaknesses