Description
Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case dofollow-case-by-case allows Cross Site Request Forgery.This issue affects DoFollow Case by Case: from n/a through <= 3.5.1.
Published: 2025-05-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery vulnerability exists in the apasionados DoFollow Case by Case plugin version 3.5.1 and earlier, allowing an attacker to cause a logged‑in user to perform unintended actions within a WordPress site. The flaw permits the attacker to forge authenticated requests that are processed by the plugin, potentially altering or deleting settings, adding malicious links, or otherwise corrupting the site’s configuration. Because the vulnerability is based on the well‑known CSRF weakness, it normally does not enable remote code execution, but it can be used to compromise the integrity and availability of the affected site. The weakness is classified as CWE‑352.

Affected Systems

Affected systems are WordPress installations that have the apasionados DoFollow Case by Case plugin installed with a version equal to or older than 3.5.1. This includes any site where the plugin is activated; the exact version numbers are captured in the CNA data but the plugin is impacted from the earliest release through 3.5.1.

Risk and Exploitability

The risk level is moderate, as reflected by a CVSS score of 4.3. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack can be performed from a web browser by sending crafted HTTP requests to the plugin’s endpoints; it requires that an authenticated user be tricked into visiting a malicious link or executing a forged request. Because the flaw relies on the user’s own credentials, it cannot be leveraged by an unauthenticated attacker alone, but it can be used successfully in a social‑engineering or drive‑by‑attack scenario against targeted sites.

Generated by OpenCVE AI on May 1, 2026 at 08:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the DoFollow Case by Case plugin to a version newer than 3.5.1, which removes the CSRF vulnerability.
  • If upgrading immediately is not possible, restrict plugin usage to trusted administrators only or disable the plugin entirely until a patched release is available.
  • Apply custom CSRF protection, such as validating WordPress nonces on all plugin actions, and/or configure a web application firewall rule to block unexpected requests to the plugin endpoints.

Generated by OpenCVE AI on May 1, 2026 at 08:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13759 Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case allows Cross Site Request Forgery. This issue affects DoFollow Case by Case: from n/a through 3.5.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case allows Cross Site Request Forgery. This issue affects DoFollow Case by Case: from n/a through 3.5.1. Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case dofollow-case-by-case allows Cross Site Request Forgery.This issue affects DoFollow Case by Case: from n/a through <= 3.5.1.
Title WordPress DoFollow Case by Case <= 3.5.1 - Cross Site Request Forgery (CSRF) Vulnerability WordPress DoFollow Case by Case plugin <= 3.5.1 - Cross Site Request Forgery (CSRF) vulnerability
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00019}

epss

{'score': 0.00022}


Mon, 12 May 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Apasionados
Apasionados dofollow Case By Case
CPEs cpe:2.3:a:apasionados:dofollow_case_by_case:*:*:*:*:*:wordpress:*:*
Vendors & Products Apasionados
Apasionados dofollow Case By Case

Thu, 08 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 May 2025 14:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in apasionados DoFollow Case by Case allows Cross Site Request Forgery. This issue affects DoFollow Case by Case: from n/a through 3.5.1.
Title WordPress DoFollow Case by Case <= 3.5.1 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Apasionados Dofollow Case By Case
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:47.463Z

Reserved: 2025-05-07T10:44:40.884Z

Link: CVE-2025-47624

cve-icon Vulnrichment

Updated: 2025-05-08T15:23:39.527Z

cve-icon NVD

Status : Modified

Published: 2025-05-07T15:16:15.560

Modified: 2026-04-23T15:30:37.840

Link: CVE-2025-47624

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:45:06Z

Weaknesses