Description
Cross-Site Request Forgery (CSRF) vulnerability in easymebiz EasyMe Connect easyme-connect allows Cross Site Request Forgery.This issue affects EasyMe Connect: from n/a through <= 3.0.3.
Published: 2025-05-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery (CSRF) in the EasyMe Connect WordPress plugin allows an attacker to forge authenticated requests on behalf of a logged‑in user. Because the vulnerability does not enforce a CSRF check, arbitrary requests that require user authentication can be executed, potentially affecting site data and configuration. The specific actions a compromised account can perform are not described in the advisory, but any operation that the user is authorized to execute could be exploited.

Affected Systems

The EasyMe Connect plugin from easymebiz, all releases from its initial version up through 3.0.3, are affected. No other vendors or products are noted as impacted.

Risk and Exploitability

The CVSS score of 4.3 indicates low severity and the EPSS score of less than 1 percent suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require a user to be logged into WordPress and visit a malicious site that issues the forged request; the attacker can then conduct any action permitted by the compromised account’s privileges.

Generated by OpenCVE AI on May 1, 2026 at 08:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade EasyMe Connect to version 3.0.4 or later, which includes CSRF protection.
  • If an upgrade is not possible, deactivate or delete the plugin to remove the vulnerability vector.
  • If the plugin must remain active and cannot be updated, limit the user roles that have access to its administrative functions and consider adding a site‑wide CSRF token check on WordPress administrative requests to provide an additional defense.

Generated by OpenCVE AI on May 1, 2026 at 08:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13769 Cross-Site Request Forgery (CSRF) vulnerability in easymebiz EasyMe Connect allows Cross Site Request Forgery. This issue affects EasyMe Connect: from n/a through 3.0.3.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in easymebiz EasyMe Connect allows Cross Site Request Forgery. This issue affects EasyMe Connect: from n/a through 3.0.3. Cross-Site Request Forgery (CSRF) vulnerability in easymebiz EasyMe Connect easyme-connect allows Cross Site Request Forgery.This issue affects EasyMe Connect: from n/a through <= 3.0.3.
Title WordPress EasyMe Connect <= 3.0.3 - Cross Site Request Forgery (CSRF) Vulnerability WordPress EasyMe Connect plugin <= 3.0.3 - Cross Site Request Forgery (CSRF) vulnerability
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}

epss

{'score': 0.0002}


Thu, 08 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 May 2025 14:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in easymebiz EasyMe Connect allows Cross Site Request Forgery. This issue affects EasyMe Connect: from n/a through 3.0.3.
Title WordPress EasyMe Connect <= 3.0.3 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:46.992Z

Reserved: 2025-05-07T10:44:34.646Z

Link: CVE-2025-47609

cve-icon Vulnrichment

Updated: 2025-05-08T16:15:11.668Z

cve-icon NVD

Status : Deferred

Published: 2025-05-07T15:16:14.247

Modified: 2026-04-23T15:30:36.217

Link: CVE-2025-47609

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:45:06Z

Weaknesses