Description
Cross-Site Request Forgery (CSRF) vulnerability in PublishPress PublishPress Revisions revisionary allows Cross Site Request Forgery.This issue affects PublishPress Revisions: from n/a through <= 3.7.22.
Published: 2026-02-19
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation via unauthenticated cross‑site request forgery
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a cross‑site request forgery flaw that permits an attacker to send authenticated requests on behalf of a logged‑in user. This can enable the attacker to perform any administrative action that the victim user is authorized to do, such as creating, editing, or deleting content. The weakness is a classic CSRF flaw (CWE‑352).

Affected Systems

Any WordPress installation using the PublishPress Revisions plugin version 3.7.22 or earlier is vulnerable. The issue applies to all releases from the plugin’s earliest version up to and including 3.7.22.

Risk and Exploitability

The CVSS base score is 5.4, indicating medium risk. The EPSS score is less than 1%, suggesting a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to be logged into WordPress and to be tricked into visiting a crafted URL, so the likely attack vector is a social‑engineering or phishing campaign targeting users with elevated privileges.

Generated by OpenCVE AI on April 16, 2026 at 00:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PublishPress Revisions to the latest available version that has remediated the CSRF flaw.
  • If an immediate upgrade is not possible, harden the site by ensuring all administrative URLs include valid WordPress nonces and by restricting access to admin pages to trusted users only.
  • Keep WordPress core and all other plugins updated to reduce the overall attack surface and to protect against similar vulnerabilities.

Generated by OpenCVE AI on April 16, 2026 at 00:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Publishpress
Publishpress publishpress Revisions
Wordpress
Wordpress wordpress
Vendors & Products Publishpress
Publishpress publishpress Revisions
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in PublishPress PublishPress Revisions revisionary allows Cross Site Request Forgery.This issue affects PublishPress Revisions: from n/a through <= 3.7.22.
Title WordPress PublishPress Revisions plugin <= 3.7.22 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Publishpress Publishpress Revisions
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:54.821Z

Reserved: 2026-02-02T12:20:47.811Z

Link: CVE-2026-25322

cve-icon Vulnrichment

Updated: 2026-02-20T16:18:08.604Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:16.630

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25322

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:45:15Z

Weaknesses