Impact
The ContentMX Content Publisher plugin contains a CSRF flaw caused by missing or incorrect nonce validation in the cmx_activate_connection action. This permits an unauthenticated attacker to trigger the action by causing a site administrator to click a crafted link. The result is that the attacker can bind their own ContentMX connection to the vulnerable site, potentially allowing unauthorized configuration or content manipulation. The weakness is classified as CWE‑352 and can compromise the integrity of the site’s plugin configuration, and potentially expose sensitive management data.
Affected Systems
All installations of the ContentMX Content Publisher plugin for WordPress with version 1.0.6 or earlier are affected. The vulnerability applies to the plugin as distributed under the vendor contentmx:ContentMX Content Publisher.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate severity. The EPSS score of less than 1 % suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. A likely attack path involves an attacker tricking an administrator into visiting a malicious link that submits the forged request. Successful exploitation would alter the plugin configuration without requiring the administrator’s credentials.
OpenCVE Enrichment
EUVD