Description
The WP URL Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the 'url_shortener_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-06-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS via CSRF
Action: Update plugin
AI Analysis

Impact

The WP URL Shortener plugin allows attackers to perform cross‑site request forgery on the settings page because a nonce check is missing or implemented incorrectly. By sending a forged request to this page, an unauthenticated attacker can modify plugin settings and inject arbitrary web scripts that are then stored in the database. The injected scripts execute in the context of the site, giving an attacker the ability to hijack administrator sessions, steal credentials, or distribute malware to visitors. This vulnerability directly results in a stored cross‑site scripting flaw governed by CWE‑352.

Affected Systems

This flaw affects the djerba: WP URL Shortener plugin for WordPress in all releases up to and including version 1.2. No other versions are listed as affected by the CNA.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, so no known widespread exploitation has been reported. The attack requires an attacker to trick a site administrator into clicking a crafted link or submitting a form, creating a CSRF exploit path that is easy to engineer but requires human interaction. Attackers can therefore gain escalated privileges on the affected WordPress instance, though they must rely on social engineering to complete the attack.

Generated by OpenCVE AI on April 22, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest version of WP URL Shortener (1.3 or higher) to fix the missing nonce validation.
  • If an upgrade cannot be applied immediately, disable or uninstall the plugin to eliminate the attack surface until the fix is available.
  • Review and ensure that all administrative endpoints enforce a valid nonce before processing input, in line with best practices for CSRF protection.

Generated by OpenCVE AI on April 22, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18324 The WP URL Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the 'url_shortener_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}

epss

{'score': 0.00015}


Sat, 14 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description The WP URL Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the 'url_shortener_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title WP URL Shortener <= 1.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:56.017Z

Reserved: 2025-06-13T13:31:42.647Z

Link: CVE-2025-6064

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-06-14T09:15:24.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:00:05Z

Weaknesses