Description
The Alink Tap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.1. This is due to missing or incorrect nonce validation on the 'alink-tap' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-05-03
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via CSRF
Action: Apply Patch
AI Analysis

Impact

The Alink Tap WordPress plugin is vulnerable to Cross‑Site Request Forgery because nonce validation on its settings page is missing or incorrect. An unauthenticated attacker can submit a forged request to the plugin’s admin page, causing the plugin to update its configuration and inject arbitrary JavaScript code that will run in the context of the site’s visitor or administrator. This stored cross‑site scripting flaw is classified as CWE‑352 and can lead to credential theft, defacement or the execution of further malicious payloads by unsuspecting site users.

Affected Systems

The plug‑in, developed by todoapuestas under the name Alink Tap, is affected in all versions up to and including 1.3.1. WordPress sites that have installed any of those versions are vulnerable. No other systems or plugins are listed as impacted in the advisory.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate overall severity. The EPSS score of less than 1% shows that exploit activity is expected to be very low, and the advisory is not currently listed in the CISA KEV catalog. Attackers would need to trick an authenticated site administrator into clicking a crafted link or submitting a forged form; thus the vulnerability requires user interaction to be exploited. While the exploitation probability is low, the potential impact of a successful XSS attack—credential compromise and site defacement—makes this a noteworthy risk for any WordPress site running the vulnerable plug‑in.

Generated by OpenCVE AI on April 20, 2026 at 22:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Alink Tap to the latest available version or apply the vendor’s patch to implement proper nonce validation on the settings page
  • If a patch is not yet published, disable the Alink Tap settings page for non‑administrator users to prevent malicious updates
  • Apply a site‑wide CSRF protection mechanism, such as adding a unique token to all admin forms
  • Configure a web application firewall to block requests to the plugin’s admin endpoint that lack a valid CSRF token

Generated by OpenCVE AI on April 20, 2026 at 22:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13312 The Alink Tap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.1. This is due to missing or incorrect nonce validation on the 'alink-tap' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Mon, 05 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 03 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Alink Tap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.1. This is due to missing or incorrect nonce validation on the 'alink-tap' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Alink Tap <= 1.3.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:33.444Z

Reserved: 2025-05-01T13:15:37.831Z

Link: CVE-2025-4198

cve-icon Vulnrichment

Updated: 2025-05-05T14:40:42.442Z

cve-icon NVD

Status : Deferred

Published: 2025-05-03T03:15:28.923

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:00:14Z

Weaknesses