Description
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress RealPress realpress allows Cross Site Request Forgery.This issue affects RealPress: from n/a through <= 1.1.0.
Published: 2026-02-19
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: CSRF that could allow an attacker to perform authorized actions on a WordPress site using the RealPress plugin
Action: Apply Patch
AI Analysis

Impact

The RealPress plugin for WordPress contains a Cross‑Site Request Forgery flaw that permits a malicious actor to persuade an authenticated visitor to issue privileged requests. By exploiting this vulnerability the attacker could alter site content, update settings, or perform any action that the logged‑in user is permitted to execute, thereby impacting the integrity and potentially the availability of the site.

Affected Systems

All installations of the RealPress plugin version 1.1.0 or earlier, distributed by ThimPress, are affected. The flaw resides in the plugin’s handling of state‑changing requests without proper CSRF protection.

Risk and Exploitability

The CVSS base score of 5.4 denotes a medium severity weakness. EPSS shows a very low exploitation probability of less than 1%, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to be authenticated to the WordPress site and to click or submit a crafted link or form that submits data to the vulnerable endpoint. While it does not allow remote code execution, an attacker who succeeds can manipulate content or configuration in a way that affects confidentiality, integrity, and availability of the affected site.

Generated by OpenCVE AI on April 16, 2026 at 00:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the RealPress plugin to a version newer than 1.1.0, as the latest releases address the CSRF issue.
  • If an immediate upgrade is not feasible, disable the RealPress plugin or remove the vulnerable endpoints until an update can be applied.
  • Implement or verify that the plugin’s state‑changing actions include a nonce or token for CSRF protection, and consider restricting sensitive actions to administrator‑only roles as an additional safeguard.

Generated by OpenCVE AI on April 16, 2026 at 00:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Thimpress
Thimpress realpress
Wordpress
Wordpress wordpress
Vendors & Products Thimpress
Thimpress realpress
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ThimPress RealPress realpress allows Cross Site Request Forgery.This issue affects RealPress: from n/a through <= 1.1.0.
Title WordPress RealPress plugin <= 1.1.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Thimpress Realpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:59.935Z

Reserved: 2026-02-17T13:23:30.505Z

Link: CVE-2026-27050

cve-icon Vulnrichment

Updated: 2026-02-19T19:08:46.870Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:26.387

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-27050

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:15:18Z

Weaknesses