Description
Cross-Site Request Forgery (CSRF) vulnerability in Valerio Monti Auto Alt Text auto-alt-text allows Cross Site Request Forgery.This issue affects Auto Alt Text: from n/a through <= 2.5.2.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Auto Alt Text WordPress plugin contains a Cross‑Site Request Forgery flaw that allows an attacker to trigger state‑changing actions on behalf of an authenticated user, potentially modifying image alt text. This critical weakness, identified as CWE‑352, permits unauthorized manipulation of content that could be used for phishing or defacement. The flaw does not provide direct code execution or data exfiltration, but it does enable an attacker to tamper with content that may affect site reputation and user experience.

Affected Systems

All installations of Valerio Monti Auto Alt Text versions up to and including 2.5.2 are affected. The plugin is a WordPress add‑on that enhances media accessibility by automatically generating alt text for images.

Risk and Exploitability

The CVSS score of 4.3 indicates a low severity rating, and the EPSS score of less than 1% suggests a small chance of exploitation. The plugin is not listed in the CISA KEV catalog, further flagging low threat activity. Based on the description, the likely attack vector is a CSRF request that the application accepts without a proper anti‑CSRF token or nonce. An attacker would need to lure a logged‑in user to a crafted URL or embed a malicious form to exploit the weakness; no local privilege escalation or remote code execution is involved.

Generated by OpenCVE AI on April 29, 2026 at 12:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Auto Alt Text plugin to the latest version that removes the CSRF defect or uninstall the plugin entirely if an update is not available.
  • If the plugin must remain in use, disable all state‑changing functionality that lacks anti‑CSRF safeguards or manually add WordPress nonces to those actions.
  • Review and, if possible, harden the plugin’s code to enforce CSRF protection on all state‑changing requests, ensuring that each request requires a valid, user‑session–bound token.
  • Apply WordPress’s built‑in security best practices, such as keeping core, themes, and all plugins up to date and restricting administrative access to trusted IP addresses.

Generated by OpenCVE AI on April 29, 2026 at 12:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Valerio Monti Auto Alt Text auto-alt-text allows Cross Site Request Forgery.This issue affects Auto Alt Text: from n/a through <= 2.5.2.
Title WordPress Auto Alt Text plugin <= 2.5.2 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:56:05.358Z

Reserved: 2025-10-24T07:50:53.684Z

Link: CVE-2025-62866

cve-icon Vulnrichment

Updated: 2025-12-10T22:03:38.818Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:03.667

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:30:10Z

Weaknesses