Impact
The vulnerability allows a remote attacker who is not authenticated to manipulate the settings of the WordPress plugin by sending a POST request to the settings page. Because the code does not validate a nonce, a logged‑in administrator can be tricked into submitting a crafted form that changes plugin options stored in the database, such as the style used to display the PageRank badge. The attack does not grant direct access to the system, but it can alter the appearance or functionality of the website and potentially serve as a foothold if the settings affect visibility or moderation. The weakness is identified as CWE‑352.
Affected Systems
The issue affects the Google PageRank Display plugin for WordPress in all releases up to and including 1.4. Affected systems are WordPress sites that have this plugin installed and have logged‑in administrators who can access the plugin’s settings page.
Risk and Exploitability
With a CVSS score of 4.3 the risk is moderate. No EPSS data is provided, so the current exploitation probability is unknown. The vulnerability is not listed in CISA KEV. An attacker can exploit this by sending a crafted CSRF request to an administrator’s session without needing additional privileges, making it a low‑effort attack vector.
OpenCVE Enrichment