Description
Cross-Site Request Forgery (CSRF) vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Cross Site Request Forgery.This issue affects Seriously Simple Podcasting: from n/a through <= 3.13.0.
Published: 2025-11-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery (CSRF) enables an attacker to submit forged HTTP requests to the WordPress installation that the Seriously Simple Podcasting plugin processes. This flaw could allow an attacker to modify podcast metadata or invoke administrative functions if the plugin does not verify the authenticity of state‑changing requests. The vulnerability is classified as CWE‑352, a failure to authenticate such requests. Based on the description, it is inferred that the attacker would need a victim who is logged into the WordPress site to execute the malicious request.

Affected Systems

The Seriously Simple Podcasting plugin, developed by Craig Hewitt for WordPress, is affected. All versions up to and including 3.13.0 contain the flaw.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score of less than 1% suggests a very low likelihood of exploitation at the time of assessment, and the vulnerability is not listed in CISA’s KEV catalog. Based on common CSRF patterns, the likely attack vector involves an attacker convincing a logged‑in administrator or content manager to visit a malicious webpage that automatically submits a forged request—this inference is drawn from the nature of CSRF attacks and the plugin’s state‑changing endpoints.

Generated by OpenCVE AI on April 29, 2026 at 23:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Seriously Simple Podcasting to the latest version that includes the CSRF fix
  • If upgrading is not immediately possible, disable the plugin or restrict its access to authenticated users only
  • Ensure that the plugin’s state‑changing actions employ proper nonce verification or other anti‑CSRF safeguards

Generated by OpenCVE AI on April 29, 2026 at 23:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 04 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Castos
Castos seriously Simple Podcasting
CPEs cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*
Vendors & Products Castos
Castos seriously Simple Podcasting

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress
Vendors & Products Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Cross Site Request Forgery.This issue affects Seriously Simple Podcasting: from n/a through <= 3.13.0.
Title WordPress Seriously Simple Podcasting plugin <= 3.13.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Castos Seriously Simple Podcasting
Craig Hewitt Seriously Simple Podcasting
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:15.342Z

Reserved: 2025-11-21T11:20:39.726Z

Link: CVE-2025-66061

cve-icon Vulnrichment

Updated: 2025-11-21T16:21:09.902Z

cve-icon NVD

Status : Modified

Published: 2025-11-21T13:15:46.920

Modified: 2026-04-27T18:16:31.960

Link: CVE-2025-66061

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:15:23Z

Weaknesses