Description
The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for unauthenticated attackers to update settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-06-10
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Settings Modification via CSRF
Action: Patch
AI Analysis

Impact

The Bunny’s Print CSS plugin for WordPress contains a Cross‑Site Request Forgery flaw that originates from missing or incorrect nonce validation in the pcss_options_subpanel() function. Because an unauthenticated attacker can send a forged request that updates the plugin’s configuration, the settings menu can be altered without the admin’s knowledge. The impact is the unauthorized modification of the plugin’s printing settings, which may change how content is rendered for end users.

Affected Systems

All installations of Bunny’s Print CSS with a version equal to or lower than 0.95 on a WordPress site are affected. The vulnerability is limited to sites that have the plugin deployed and is not a problem for WordPress core or other plugins.

Risk and Exploitability

The CVSS base score of 4.3 indicates a moderate severity. The EPSS score of less than 1% suggests that exploitation is unlikely in the short term. The issue is not listed in the CISA KEV catalog, meaning no public exploit has been confirmed. Attackers would need to convince a site administrator to click a crafted link or otherwise trigger the CSRF request. The risk level remains moderate in the absence of a known exploit, but awareness is advisable.

Generated by OpenCVE AI on April 22, 2026 at 01:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Bunny’s Print CSS to a release newer than 0.95 when it becomes available.
  • If no update is available, temporarily uninstall or disable the plugin until a patch is released.
  • Verify that site administrators understand CSRF risks for plugin settings and enforce strict nonce checks in any custom modifications.

Generated by OpenCVE AI on April 22, 2026 at 01:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17623 The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for unauthenticated attackers to update settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00014}

epss

{'score': 0.00015}


Tue, 10 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 04:00:00 +0000

Type Values Removed Values Added
Description The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for unauthenticated attackers to update settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Bunny’s Print CSS <= 0.95 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:00.155Z

Reserved: 2025-06-09T14:28:56.837Z

Link: CVE-2025-5925

cve-icon Vulnrichment

Updated: 2025-06-10T13:10:00.912Z

cve-icon NVD

Status : Deferred

Published: 2025-06-10T04:15:54.330

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:30:05Z

Weaknesses