Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Softwud
Softwud page Blocks Wordpress Wordpress wordpress |
|
| Vendors & Products |
Softwud
Softwud page Blocks Wordpress Wordpress wordpress |
Tue, 14 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 11 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Page Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.0. This is due to missing or incorrect nonce validation on the admin_process_widget_page_change function. This makes it possible for unauthenticated attackers to modify widget page block configurations via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Page Blocks <= 1.1.0 - Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-14T18:45:38.046Z
Reserved: 2025-08-28T19:19:01.503Z
Link: CVE-2025-9626
Updated: 2025-10-14T18:32:03.562Z
Status : Awaiting Analysis
Published: 2025-10-11T10:15:44.810
Modified: 2025-10-14T19:36:59.730
Link: CVE-2025-9626
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:12:31Z