Description
The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-08-16
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via CSRF
Action: Patch
AI Analysis

Impact

The LatestCheckins plugin for WordPress is vulnerable to a Cross‑Site Request Forgery flaw in all versions up to and including 1. This flaw arises because the plugin fails to validate or incorrectly validates the nonce on the 'LatestCheckins' page, allowing an unauthenticated attacker to forge a request that updates plugin settings. By submitting a crafted request, an attacker can inject malicious scripts that are then stored by the plugin and executed in the browser context of site administrators or other logged‑in users. The result is a stored Cross‑Site Scripting vulnerability that compromises user sessions and can lead to account takeover, data exfiltration, or defacement.

Affected Systems

All installations of the WordPress plugin LatestCheckins version 1.0 or earlier, released by vendor janyksteenbeek. These installations are affected regardless of configuration, as the vulnerability exists in the core plugin code before any settings changes.

Risk and Exploitability

The CVSS score for this vulnerability is 6.1, indicating a medium level severity. The EPSS score is below 1%, showing that the probability of widespread exploitation is low at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by persuading a site administrator to visit a malicious link that performs an authenticated or unauthenticated request to the plugin page. With the missing nonce check, the request will be processed and malicious scripts will be saved in the plugin's configuration, later executed when the admin accesses the page. Given the low EPSS, immediate risk is moderate, but since stored XSS can be leveraged for credential theft, the vulnerability should be considered a high business risk.

Generated by OpenCVE AI on April 21, 2026 at 03:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the LatestCheckins plugin to the latest released version that fixes the nonce validation issue
  • If an update is not feasible, disable or remove the 'LatestCheckins' page from public view or restrict it to trusted administrator accounts only
  • In the interim, enforce a Content Security Policy that blocks execution of inline scripts and requires script‑src from trusted origins, to mitigate the impact of any injected scripts
  • Additionally, scan the site for any remnants of injected scripts and remove them manually

Generated by OpenCVE AI on April 21, 2026 at 03:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25061 The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Mon, 18 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Janyksteenbeek
Janyksteenbeek latestcheckins
Wordpress
Wordpress wordpress
Vendors & Products Janyksteenbeek
Janyksteenbeek latestcheckins
Wordpress
Wordpress wordpress

Mon, 18 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 16 Aug 2025 03:45:00 +0000

Type Values Removed Values Added
Description The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title LatestCheckins <= 1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Janyksteenbeek Latestcheckins
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:13.339Z

Reserved: 2025-07-15T18:45:41.808Z

Link: CVE-2025-7683

cve-icon Vulnrichment

Updated: 2025-08-18T13:35:03.428Z

cve-icon NVD

Status : Deferred

Published: 2025-08-16T04:16:07.460

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:45:27Z

Weaknesses