Description
The PopAd plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the PopAd_reset_cookie_time function. This makes it possible for unauthenticated attackers to reset cookie time settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-09-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery – Unauthorized Settings Update
Action: Apply Patch
AI Analysis

Impact

The PopAd plugin for WordPress contains a Cross‑Site Request Forgery flaw in versions up to 1.0.4. The flaw arises from missing or incorrect nonce validation on the function that resets cookie time settings. An attacker who can trick a logged‑in site administrator into submitting a crafted request may cause the administrator to reset the cookie time settings without authorization. This changes cookie expiration behavior and can enable easier persistence or session reuse, undermining the intended security posture of the site.

Affected Systems

The affected component is the PopAd plugin by alobaidi, deployed on WordPress sites. All installed versions of PopAd version 1.0.4 or earlier are vulnerable. No other WordPress plugins or core software is listed as affected.

Risk and Exploitability

The CVSS score of 5.3 categorizes the vulnerability as moderate, and it carries an EPSS score of less than 1%, indicating a very low probability of exploitation at the time of analysis. Because the flaw relies on CSRF via a forged request that merely requires tripping an administrator into clicking a link, the vulnerability is not considered a high‑risk attack vector. Nonetheless, it is not listed in the CISA KEV catalog, which means no publicly available exploit is known but the nature of CSRF suggests that attackers could still pose a threat to sites with insufficient user training or internal controls. Mitigation should focus on ensuring proper nonce validation or disabling the vulnerable functionality before an official patch is applied.

Generated by OpenCVE AI on April 21, 2026 at 03:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PopAd plugin to a version newer than 1.0.4.
  • If an upgrade is unavailable, edit the plugin file admin/admin.php to add a nonce check to the PopAd_reset_cookie_time function or comment out the function entirely.
  • Configure a web application firewall rule that rejects requests to the reset cookie time endpoint from unauthenticated users or requires proper nonce validation.

Generated by OpenCVE AI on April 21, 2026 at 03:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 04 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 04 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 04 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
Description The PopAd plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the PopAd_reset_cookie_time function. This makes it possible for unauthenticated attackers to reset cookie time settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title PopAd <= 1.0.4 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:20.500Z

Reserved: 2025-08-28T17:42:17.929Z

Link: CVE-2025-9616

cve-icon Vulnrichment

Updated: 2025-09-04T14:26:51.650Z

cve-icon NVD

Status : Deferred

Published: 2025-09-04T10:42:35.773

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:30:26Z

Weaknesses