Description
Cross-Site Request Forgery (CSRF) vulnerability in Fastly Fastly fastly allows Cross Site Request Forgery.This issue affects Fastly: from n/a through <= 1.2.28.
Published: 2025-09-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Fastly WordPress plugin contains a CSRF vulnerability that allows an attacker to force an authenticated user to perform unintended actions without their knowledge. The weakness is identified as CWE‑352, a classic CSRF flaw. Because the vulnerability relies on the victim’s authenticated session, it does not expose credentials or data directly, but it can lead to unauthorized administrative changes or other actions executed in the attacker’s context. The impact is restricted to sessions that are active at the time of the malicious request and does not compromise the core WordPress installation.

Affected Systems

Fastly provided the WordPress Fastly plugin prior to version 1.2.29. Any installation of the plugin at version 1.2.28 or earlier is vulnerable. The weakness exists only in the WordPress environment where the plugin is active and does not affect the core WordPress software itself.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score of less than 1 % signals an extremely low probability of exploitation in the wild. The vulnerability is not listed in CISA KEV. An attacker would need to lure a logged‑in user to a crafted URL or HTML payload; the likelihood of spontaneous exploitation is low, but the risk is present if users are frequently exposed to untrusted input.

Generated by OpenCVE AI on April 30, 2026 at 06:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WordPress Fastly plugin to a version newer than 1.2.28
  • If an immediate upgrade is not possible, disable or remove the plugin’s endpoints that process state‑changing requests and enforce WordPress nonce validation for any remaining functionality
  • Limit access to the plugin’s administrative pages by employing network or application firewall rules that allow only trusted IP addresses

Generated by OpenCVE AI on April 30, 2026 at 06:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-30600 Cross-Site Request Forgery (CSRF) vulnerability in Fastly Fastly allows Cross Site Request Forgery. This issue affects Fastly: from n/a through 1.2.28.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Fastly Fastly allows Cross Site Request Forgery. This issue affects Fastly: from n/a through 1.2.28. Cross-Site Request Forgery (CSRF) vulnerability in Fastly Fastly fastly allows Cross Site Request Forgery.This issue affects Fastly: from n/a through <= 1.2.28.
Title WordPress Fastly Plugin <= 1.2.28 - Cross Site Request Forgery (CSRF) Vulnerability WordPress Fastly plugin <= 1.2.28 - Cross Site Request Forgery (CSRF) vulnerability
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Fastly
Fastly fastly
Wordpress
Wordpress wordpress
Vendors & Products Fastly
Fastly fastly
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 18:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Fastly Fastly allows Cross Site Request Forgery. This issue affects Fastly: from n/a through 1.2.28.
Title WordPress Fastly Plugin <= 1.2.28 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Fastly Fastly
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:41.783Z

Reserved: 2025-08-27T16:18:58.324Z

Link: CVE-2025-58199

cve-icon Vulnrichment

Updated: 2025-09-23T15:55:20.084Z

cve-icon NVD

Status : Deferred

Published: 2025-09-22T19:16:06.207

Modified: 2026-04-23T15:33:17.307

Link: CVE-2025-58199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T06:45:16Z

Weaknesses