Description
Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator allows Cross-Site Scripting (XSS). This issue affects Virtual Moderator: from n/a through 1.4.
Published: 2025-06-20
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Virtual Moderator plugin for WordPress contains a Cross‑Site Request Forgery weakness that, when in use, can be abused to perform Cross‑Site Scripting attacks. An attacker can craft a malicious request that causes the plugin to execute arbitrary JavaScript in the context of a logged‑in WordPress user, potentially exfiltrating data, hijacking sessions, or defacing the site. The flaw falls under CWE‑352 and can compromise confidentiality, integrity, and availability of the affected website.

Affected Systems

WordPress sites that install the Virtual Moderator plugin version 1.4 or earlier, released by Adnan Haque (a11n). All installations of the plugin from its earliest release through 1.4 are vulnerable.

Risk and Exploitability

With a CVSS base score of 7.1, the vulnerability poses a moderate‑to‑high risk. The EPSS score is listed as <1%, indicating a low probability of exploitation at present, and it is not yet catalogued in CISA KEV. Likely attack vectors involve an attacker hosting a malicious page that forces a logged‑in administrator to load the vulnerable URL, thereby triggering the CSRF‑to‑XSS chain.

Generated by OpenCVE AI on April 30, 2026 at 11:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Virtual Moderator plugin to the latest version (v1.5 or newer).
  • Ensure the updated installation removes the CSRF flaw; verify the presence of anti‑CSRF tokens or that the endpoint no longer performs privileged actions via GET requests.
  • Restrict administrative access to the plugin’s privileged endpoints by limiting user roles to administrators and, if possible, adding CSRF protection or sanitizing user input as per best practices.

Generated by OpenCVE AI on April 30, 2026 at 11:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28458 Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator allows Cross-Site Scripting (XSS). This issue affects Virtual Moderator: from n/a through 1.4.
History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator virtual-moderator allows Cross-Site Scripting (XSS).This issue affects Virtual Moderator: from n/a through <= 1.4. Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator allows Cross-Site Scripting (XSS). This issue affects Virtual Moderator: from n/a through 1.4.
References

Thu, 23 Apr 2026 15:45:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator allows Cross-Site Scripting (XSS). This issue affects Virtual Moderator: from n/a through 1.4. Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator virtual-moderator allows Cross-Site Scripting (XSS).This issue affects Virtual Moderator: from n/a through <= 1.4.
References

Mon, 23 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Adnan Haque (a11n) Virtual Moderator allows Cross-Site Scripting (XSS). This issue affects Virtual Moderator: from n/a through 1.4.
Title WordPress Virtual Moderator plugin <= 1.4 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:18.654Z

Reserved: 2025-06-19T10:03:09.016Z

Link: CVE-2025-52772

cve-icon Vulnrichment

Updated: 2025-06-23T16:12:52.517Z

cve-icon NVD

Status : Deferred

Published: 2025-06-20T15:15:33.087

Modified: 2026-04-28T19:33:26.357

Link: CVE-2025-52772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T11:15:35Z

Weaknesses