Description
Cross-Site Request Forgery (CSRF) vulnerability in Copyscape Copyscape Premium copyscape-premium allows Cross Site Request Forgery.This issue affects Copyscape Premium: from n/a through <= 1.4.1.
Published: 2026-02-03
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized state‑changing actions via CSRF
Action: Apply Patch
AI Analysis

Impact

WordPress sites that run the Copyscape Premium plugin up to version 1.4.1 are susceptible to a Cross‑Site Request Forgery flaw that does not validate state‑changing requests. The weakness allows a malicious site to force an authenticated user to submit forged requests that can modify or delete content, thereby compromising the integrity of the site. This is a classic CSRF vulnerability identified as CWE-352 and can be used to perform any operation that the compromised user is authorized to execute.

Affected Systems

Any WordPress installation that includes the Copyscape Premium plugin and is running a version equal to or earlier than 1.4.1 is affected. The flaw applies across all sites using the plugin regardless of other security configurations, and the vulnerability remains unless the code is removed or updated beyond that version.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, while the EPSS score of less than 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user to be tricked into visiting a malicious site that submits a forged request, which is a typical CSRF attack vector inferred from the nature of the flaw. Only users who are logged in with sufficient privileges can be targeted, but the impact could still be significant if the site’s core content or critical settings are altered.

Generated by OpenCVE AI on April 16, 2026 at 17:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Copyscape Premium plugin to the latest version available from the vendor to remove the CSRF flaw.
  • If an update is not immediately available or possible, uninstall or disable the plugin so the vulnerable code no longer executes.
  • Deploy a Web Application Firewall rule that rejects state‑changing requests lacking a valid CSRF token, providing a temporary mitigation while a patch can be applied.

Generated by OpenCVE AI on April 16, 2026 at 17:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Copyscape Copyscape Premium copyscape-premium allows Cross Site Request Forgery.This issue affects Copyscape Premium: from n/a through <= 1.4.1.
Title WordPress Copyscape Premium plugin <= 1.4.1 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:52.279Z

Reserved: 2026-01-28T09:50:35.465Z

Link: CVE-2026-24966

cve-icon Vulnrichment

Updated: 2026-02-03T16:55:10.324Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T15:16:17.100

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24966

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:30:26Z

Weaknesses