Description
The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-05-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Cross‑Site Request Forgery that permits deletion of AHA pages
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the AHAthat Plugin for WordPress and results from a missing or incorrect nonce validation in the aha_plugin_page() function. This classic CSRF flaw allows an attacker who tricks an administrator into visiting a crafted link to remove AHA pages without authentication, causing loss of content and potential disruption of site functionality. The weakness is identified as CWE‑352, reflecting the lack of proper request validation.

Affected Systems

Versions of the AHAthat Plugin up to and including 1.6, distributed by vendor mitchelllevy, are affected. The flaw exists in the core admin interface of the plugin and has no additional version restrictions beyond the 1.6 cutoff.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a social‑engineering step that convinces a site administrator to click a malicious link, after which the unauthenticated attacker can delete pages via the forged request.

Generated by OpenCVE AI on April 20, 2026 at 22:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AHAthat Plugin to the latest version that includes proper nonce validation, or uninstall the plugin entirely if no patch is available.
  • Verify that all administrative forms in the plugin use valid nonces and that no GET requests perform destructive actions.
  • Consider limiting administrative access to trusted IP addresses or implementing two‑factor authentication to reduce the risk of accidental clicks on malicious links.

Generated by OpenCVE AI on April 20, 2026 at 22:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13472 The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00015}

epss

{'score': 0.00018}


Tue, 06 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 May 2025 04:30:00 +0000

Type Values Removed Values Added
Description The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title AHAthat Plugin <= 1.6 - Cross-Site Request Forgery to AHA Page Deletion
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:29.820Z

Reserved: 2025-05-05T15:45:30.529Z

Link: CVE-2025-4337

cve-icon Vulnrichment

Updated: 2025-05-06T14:17:44.517Z

cve-icon NVD

Status : Deferred

Published: 2025-05-06T05:15:50.597

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:00:14Z

Weaknesses