Description
Cross-Site Request Forgery (CSRF) vulnerability in Taraprasad Swain HTACCESS IP Blocker htaccess-ip-blocker allows Stored XSS.This issue affects HTACCESS IP Blocker: from n/a through <= 1.0.
Published: 2025-09-26
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery vulnerability in the HTACCESS IP Blocker plugin allows an attacker who can craft a forged request to the plugin’s administrative endpoints to inject malicious payloads that are stored and later executed as part of a stored XSS attack. The flaw arises because the plugin fails to validate the origin of requests that modify the IP block list, enabling an attacker to submit malicious JavaScript that will run in the browser context of any user who loads the affected pages.

Affected Systems

The vulnerability affects the WordPress plugin HTACCESS IP Blocker created by Taraprasad Swain, specifically all released versions up to and including 1.0. Any WordPress site that has this plugin installed and has not upgraded to a later version is susceptible.

Risk and Exploitability

The CVSS score of 7.1 indicates a high level of severity, while an EPSS score of <1% suggests the probability of exploitation is currently low but could rise as more sites deploy the plugin. The vulnerability is not listed in CISA’s KEV catalog, so no known widespread exploitation has been documented. The likely attack vector is a web‑based exploit that requires an authenticated session or access to the plugin’s admin interface; attackers may construct a forged request to trigger the vulnerable action and inject payloads that persist in the site’s output.

Generated by OpenCVE AI on April 29, 2026 at 23:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HTACCESS IP Blocker to a version newer than 1.0 where the CSRF issue is fixed.
  • Restrict access to the plugin’s administrative URLs by limiting allowed IP addresses or placing them behind additional authentication.
  • Enhance protection by ensuring that all forms within the plugin include a valid CSRF token that is validated on the server side.

Generated by OpenCVE AI on April 29, 2026 at 23:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31236 Cross-Site Request Forgery (CSRF) vulnerability in Taraprasad Swain HTACCESS IP Blocker allows Stored XSS. This issue affects HTACCESS IP Blocker: from n/a through 1.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Taraprasad Swain HTACCESS IP Blocker allows Stored XSS. This issue affects HTACCESS IP Blocker: from n/a through 1.0. Cross-Site Request Forgery (CSRF) vulnerability in Taraprasad Swain HTACCESS IP Blocker htaccess-ip-blocker allows Stored XSS.This issue affects HTACCESS IP Blocker: from n/a through <= 1.0.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Mon, 29 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 26 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 08:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Taraprasad Swain HTACCESS IP Blocker allows Stored XSS. This issue affects HTACCESS IP Blocker: from n/a through 1.0.
Title WordPress HTACCESS IP Blocker Plugin <= 1.0 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:56.910Z

Reserved: 2025-09-25T15:28:19.137Z

Link: CVE-2025-60170

cve-icon Vulnrichment

Updated: 2025-09-26T13:20:35.689Z

cve-icon NVD

Status : Deferred

Published: 2025-09-26T09:15:46.837

Modified: 2026-04-23T15:34:20.990

Link: CVE-2025-60170

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T00:00:14Z

Weaknesses