Impact
The Browser Sniff plugin for WordPress is affected by a missing or incorrect nonce check that allows Cross‑Site Request Forgery. An unauthenticated attacker can trick a site administrator into performing a forged request, such as clicking a link, which results in the administrator updating plugin settings with malicious scripts. These scripts are stored and executed in the administrators’ and visitors’ browsers, enabling theft of credentials, session hijacking, or defacement.
Affected Systems
The vulnerability exists in all versions of the Browser Sniff plugin up to and including 2.3. Only WordPress sites that have the Browser Sniff plugin installed and have not upgraded beyond 2.3 are at risk.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a privileged (administrator) user to unknowingly click a crafted link, making the attack vector reliant on social engineering. Because the attack surface is limited to sites with the affected plugin and an active admin account, the overall risk is moderate but still actionable.
OpenCVE Enrichment
EUVD