Description
Cross-Site Request Forgery (CSRF) vulnerability in iseremet Reloadly reloadly-topup-widget allows Stored XSS.This issue affects Reloadly: from n/a through <= 2.0.1.
Published: 2025-10-27
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Reloadly reloadly‑topup‑widget plugin for WordPress contains a Cross‑Site Request Forgery flaw that can be abused to submit a crafted request on behalf of a user, resulting in a stored cross‑site scripting payload. Attacker‑controlled JavaScript can persist in the site data and run in the browsers of future visitors. The weakness is classified as CWE‑352.

Affected Systems

The vulnerability affects the iseremet Reloadly reloadly‑topup‑widget plugin for WordPress. All releases up to and including version 2.0.1 are vulnerable. No patch version is listed in the information provided, so any installation of the plugin before 2.0.2 should be considered at risk.

Risk and Exploitability

The CVSS score of 7.1 indicates a medium‑to‑high severity attack. The EPSS score is reported as < 1%, implying that widespread exploitation is unlikely at this time, and the vulnerability is not included in the CISA KEV catalog. The attack vector is typical of CSRF flaws; it likely requires a legitimate session on the target site and the victim’s browser to be tricked into submitting a malicious request. This inference is based on common CSRF characteristics, as the input does not explicitly state the prerequisites for exploitation.

Generated by OpenCVE AI on April 30, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Reloadly reloadly‑topup‑widget plugin to a version newer than 2.0.1.
  • If an upgrade cannot be performed immediately, deactivate or remove the plugin until a fixed release is available.
  • When the plugin remains active, enforce CSRF protection (e.g., include a valid nonce token for any action that modifies data) and monitor site logs for unusual requests that might indicate stored XSS exploitation.

Generated by OpenCVE AI on April 30, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in iseremet Reloadly reloadly-topup-widget allows Stored XSS.This issue affects Reloadly: from n/a through <= 2.0.1.
Title WordPress Reloadly plugin <= 2.0.1 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:06.943Z

Reserved: 2025-10-24T14:24:55.408Z

Link: CVE-2025-62956

cve-icon Vulnrichment

Updated: 2025-10-27T15:09:53.998Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:55.917

Modified: 2026-04-27T17:16:37.873

Link: CVE-2025-62956

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:30:06Z

Weaknesses