Description
Cross-Site Request Forgery (CSRF) vulnerability in AA-Team Wordpress Movies Bulk Importer movies importer allows Cross Site Request Forgery.This issue affects Wordpress Movies Bulk Importer: from n/a through <= 1.0.
Published: 2026-01-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Request Forgery (CSRF)
Action: Patch
AI Analysis

Impact

A Cross‑Site Request Forgery vulnerability exists in the AA‑Team WordPress Movies Bulk Importer plugin for WordPress versions up through 1.0. The flaw allows an attacker to send forged requests from a victim’s authenticated session, enabling the attacker to execute bulk import actions that the user is authorized to perform. This could lead to unauthorized data manipulation or creation within the plugin’s database, compromising the integrity of movie listings and potentially exposing sensitive configuration data if the bulk import writes additional metadata.

Affected Systems

The vulnerability affects WordPress sites that have the AA‑Team WordPress Movies Bulk Importer plugin version 1.0 or earlier installed. Sites running later releases are not impacted. Administrators using the default role that grants access to the import feature are at risk if they leave the plugin enabled in a publicly reachable environment.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk. The EPSS value of less than 1% suggests a low probability of real‑world exploitation at this time, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, the attack vector requires an authenticated user to be logged in while a malicious webpage triggers the import action. If privileged users are frequently active, the potential impact increases, especially if the bulk import endpoint accepts arbitrary file uploads or tampered data. Regular monitoring of application logs for unexpected bulk import activity can provide early warning of abuse.

Generated by OpenCVE AI on April 18, 2026 at 03:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WordPress Movies Bulk Importer plugin to the latest version that removes the CSRF flaw.
  • Restrict the bulk import capability to administrators or a custom role by adjusting the plugin’s role‑based access control so that only trusted users can trigger import operations.
  • If the import feature is not required, disable or delete the plugin entirely to eliminate the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 03:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Aa-team
Aa-team wordpress Movies Bulk Importer
Wordpress
Wordpress wordpress
Vendors & Products Aa-team
Aa-team wordpress Movies Bulk Importer
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in AA-Team Wordpress Movies Bulk Importer movies importer allows Cross Site Request Forgery.This issue affects Wordpress Movies Bulk Importer: from n/a through <= 1.0.
Title WordPress Wordpress Movies Bulk Importer plugin <= 1.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Aa-team Wordpress Movies Bulk Importer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T17:48:30.424Z

Reserved: 2026-01-07T12:21:24.564Z

Link: CVE-2026-22359

cve-icon Vulnrichment

Updated: 2026-01-22T19:43:01.445Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:31.977

Modified: 2026-04-28T19:36:31.543

Link: CVE-2026-22359

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:45:21Z

Weaknesses