Description
The Auto Post Scheduler plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.84. This is due to missing nonce validation on the 'aps_options_page' function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-03-31
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Auto Post Scheduler plugin is susceptible to a CSRF flaw that omits nonce verification in the aps_options_page handler. If an attacker forces an administrator to submit a forged request, the request can change plugin settings and insert arbitrary JavaScript. The injected script is stored and later served to site visitors or admins, providing stored cross‑site scripting that can read cookies, hijack sessions, or modify page content. This weakness, classified as CWE‑79, enables attackers to compromise the confidentiality and integrity of the website without needing privileged credentials beyond a regular administrator.

Affected Systems

Any WordPress site running Auto Post Scheduler version 1.84 or earlier, distributed by johnh10, is affected. Sites that have not applied the latest release are at risk. No data on proprietary modifications or custom builds, so the stated versions should be considered the full scope.

Risk and Exploitability

The CVSS base score of 6.1 places the vulnerability in the medium category. Because the exploit requires the attacker to successfully induce an admin to click a crafted link, it relies on social engineering rather than automated exploitation, which lowers the real‑world exploitation probability. EPSS data is unavailable and the flaw is not listed in the KEV catalog, suggesting it has not yet been widely abused. Nonetheless, the potential for persistent script execution means administrators should treat this as a priority issue and address promptly.

Generated by OpenCVE AI on March 31, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to the latest available version that removes the nonce check
  • Verify post‑upgrade that no malicious code remains in the plugin settings
  • If upgrading is not possible, disable or delete the plugin until a safe version is released
  • Implement an additional CMS‑wide CSRF protection plugin to guard against similar issues in other extensions
  • Regularly audit administrator activity and review script injections

Generated by OpenCVE AI on March 31, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Johnh10
Johnh10 auto Post Scheduler
Wordpress
Wordpress wordpress
Vendors & Products Johnh10
Johnh10 auto Post Scheduler
Wordpress
Wordpress wordpress

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description The Auto Post Scheduler plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.84. This is due to missing nonce validation on the 'aps_options_page' function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Auto Post Scheduler <= 1.84 - Cross-Site Request Forgery to Stored Cross-Site Scripting via aps_options_page
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Johnh10 Auto Post Scheduler
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:54.457Z

Reserved: 2026-02-04T07:11:17.079Z

Link: CVE-2026-1877

cve-icon Vulnrichment

Updated: 2026-03-31T13:48:12.175Z

cve-icon NVD

Status : Deferred

Published: 2026-03-31T06:16:00.937

Modified: 2026-04-24T18:11:16.583

Link: CVE-2026-1877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:28Z

Weaknesses