Description
Cross-Site Request Forgery (CSRF) vulnerability in Alessandro Piconi Simple Keyword to Link simple-keyword-to-link allows Cross Site Request Forgery.This issue affects Simple Keyword to Link: from n/a through <= 1.5.
Published: 2025-12-24
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is a classic CSRF vulnerability (CWE‑352) that allows an attacker to trick a logged‑in user into sending a malicious request to the WordPress site. By exploiting the missing anti‑CSRF token on the Simple Keyword to Link plugin’s endpoints, an attacker could trigger edits to link keywords or other plugin settings without the user’s explicit consent, potentially disrupting site content or redirecting traffic for malicious purposes.

Affected Systems

The vulnerability exists in all released builds of the Simple Keyword to Link WordPress plugin published by Alessandro Piconi, from the very first version through version 1.5 inclusive. All installations running any of these versions are susceptible.

Risk and Exploitability

The calculated CVSS score of 5.4 places the issue in the moderate range, reflecting the need for user authentication and a valid session to carry out the attack. The EPSS score of less than 1% indicates a very low probability of real‑world exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would likely attempt the exploit by enticing an authenticated administrator to visit a crafted link or form, or by luring users to websites that automatically submit the malicious request. Maintenance of a low exploitation probability does not reduce the need for remediation, especially given the potential for administrative privilege abuse.

Generated by OpenCVE AI on April 29, 2026 at 15:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Keyword to Link plugin to a version newer than 1.5, which removes the CSRF weakness.
  • When an upgrade is not immediately possible, restrict access to the plugin’s administrative pages by IP whitelisting or by placing them behind MFA protections.
  • Ensure that all forms and Ajax calls in the plugin include a valid WordPress nonce or CSRF token, and that the server validates it before performing any changes.
  • Audit site logs for unsolicited link‑modification actions and review administrative activity for anomalies.

Generated by OpenCVE AI on April 29, 2026 at 15:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Alessandro Piconi Simple Keyword to Link simple-keyword-to-link allows Cross Site Request Forgery.This issue affects Simple Keyword to Link: from n/a through <= 1.5.
Title WordPress Simple Keyword to Link plugin <= 1.5 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:30.696Z

Reserved: 2025-12-19T10:17:28.558Z

Link: CVE-2025-68573

cve-icon Vulnrichment

Updated: 2025-12-24T18:51:37.646Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:24.300

Modified: 2026-04-27T19:16:31.987

Link: CVE-2025-68573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T15:30:14Z

Weaknesses