Description
Cross-Site Request Forgery (CSRF) vulnerability in Yoav Farhi RTL Tester rtl-tester allows Cross Site Request Forgery.This issue affects RTL Tester: from n/a through <= 1.2.
Published: 2025-12-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The identified flaw is a Cross‑Site Request Forgery vulnerability in the Yoav Farhi RTL Tester WordPress plugin. The flaw permits the execution of legitimate actions on the site by sending forged requests from an attacker‑controlled webpage when a user interacts with that page. The CVE description does not specify whether the target user must be authenticated, but CSRF attacks typically rely on a victim’s authenticated session. The consequence is that an attacker could modify the site’s content, change settings, or perform other actions that the authenticated user is authorized to do, thereby compromising the integrity of the website.

Affected Systems

The vulnerability affects all installations of the RTL Tester plugin for WordPress with version 1.2 or earlier. Any WordPress site that has installed this plugin within that range is susceptible. No other WordPress plugins or core components are listed as affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a medium severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attacker would normally perform the exploit by luring the victim into loading a malicious webpage that automatically submits a request to the vulnerable endpoint, leveraging the victim’s browser as the vector. No direct network access to the target server is required for this attack.

Generated by OpenCVE AI on April 29, 2026 at 22:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RTL Tester to any version newer than 1.2 if a patch is available
  • If no update exists, uninstall the plugin completely to eliminate the vulnerable functionality
  • If removal is not immediately feasible, disable the plugin or replace it with a WordPress core or another plugin that implements proper CSRF token validation

Generated by OpenCVE AI on April 29, 2026 at 22:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Tue, 16 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Yoav Farhi RTL Tester rtl-tester allows Cross Site Request Forgery.This issue affects RTL Tester: from n/a through <= 1.2.
Title WordPress RTL Tester plugin <= 1.2 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:12.257Z

Reserved: 2025-10-29T03:08:12.203Z

Link: CVE-2025-64239

cve-icon Vulnrichment

Updated: 2025-12-16T18:21:39.812Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T09:15:53.377

Modified: 2026-04-27T16:16:36.513

Link: CVE-2025-64239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T22:45:06Z

Weaknesses