Description
Cross-Site Request Forgery (CSRF) vulnerability in Igor Jerosimić I Order Terms i-order-terms allows Cross Site Request Forgery.This issue affects I Order Terms: from n/a through <= 1.5.0.
Published: 2025-11-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A cross‑site request forgery flaw exists in the I Order Terms plugin for WordPress. Based on the description, it is inferred that the vulnerability permits an attacker to induce a logged‑in user to unknowingly submit state‑changing requests to the site, potentially violating the integrity of the site’s data. The weakness is classified as CWE‑352. No further specific impact on orders or financial loss is documented in the supplied information.

Affected Systems

WordPress sites that use the I Order Terms plugin version 1.5.0 or earlier. The plugin is distributed by Igor Jerosimić. No additional operating‑system or WordPress version constraints are mentioned.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score of < 1 % suggests a very low probability of exploitation at present, although actors with expertise could still target the flaw. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector is a browsing‑time CSRF attack that requires the victim to be authenticated to the WordPress site and to trigger a state‑changing action within the plugin. Because the attack depends on user interaction, the chance of immediate exploitation is low, yet administrators should act to eliminate the risk.

Generated by OpenCVE AI on April 30, 2026 at 05:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the I Order Terms plugin to the latest released version that removes the CSRF flaw
  • If an upgrade cannot be performed immediately, disable or remove the plugin from the WordPress installation to prevent exploitation
  • Add a valid CSRF token to all state‑changing actions in the plugin or enable site‑wide CSRF protection if not already enforced

Generated by OpenCVE AI on April 30, 2026 at 05:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Igor Jerosimić I Order Terms i-order-terms allows Cross Site Request Forgery.This issue affects I Order Terms: from n/a through <= 1.5.0.
Title WordPress I Order Terms plugin <= 1.5.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:16.976Z

Reserved: 2025-11-21T11:21:12.145Z

Link: CVE-2025-66097

cve-icon Vulnrichment

Updated: 2025-11-21T16:32:41.673Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T13:15:51.180

Modified: 2026-04-27T18:16:35.477

Link: CVE-2025-66097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses