Description
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Folio simple-folio allows Cross Site Request Forgery.This issue affects Simple Folio: from n/a through <= 1.1.0.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑site request forgery in the Simple Folio plugin is described as a vulnerability that may allow an attacker to trick an authenticated user into submitting requests that perform any administrative actions the user is authorized to do. The flaw does not grant execution of arbitrary code; it likely enables unauthorized modifications to site content, but the CVE does not list specific actions. Based on typical CSRF behavior, the attacker could potentially trigger any administrative action the victim is permitted to execute.

Affected Systems

The vulnerability affects the WordPress Simple Folio plugin developed by PressTigers. Any installation of Simple Folio up to and including version 1.1.0 is affected. Newer releases beyond 1.1.0 are not impacted.

Risk and Exploitability

The CVSS score of 4.3 indicates medium severity. The EPSS score of less than 1 % suggests exploitation is unlikely in the near term, and the issue is not listed in CISA KEV. Because the vulnerability is a CSRF flaw, an attacker may attempt to trick an authenticated user into visiting a crafted URL or clicking a malicious link. The specific user privileges required for impact are not explicitly detailed in the CVE, but the potential damage would depend on the victim’s role.

Generated by OpenCVE AI on April 30, 2026 at 05:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple Folio plugin to the latest stable release (1.1.1 or later) that contains the CSRF fix.
  • Review the plugin’s configuration to ensure no legacy or exposed endpoints allow unauthenticated CSRF requests.
  • Monitor the site for sudden changes in content or media that could indicate exploitation.

Generated by OpenCVE AI on April 30, 2026 at 05:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 11 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Presstigers
Presstigers simple Folio
Wordpress
Wordpress wordpress
Vendors & Products Presstigers
Presstigers simple Folio
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Folio simple-folio allows Cross Site Request Forgery.This issue affects Simple Folio: from n/a through <= 1.1.0.
Title WordPress Simple Folio plugin <= 1.1.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Presstigers Simple Folio
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:12.692Z

Reserved: 2025-10-29T03:08:17.829Z

Link: CVE-2025-64256

cve-icon Vulnrichment

Updated: 2025-12-11T19:04:36.523Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:14.813

Modified: 2026-04-27T16:16:38.113

Link: CVE-2025-64256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses