Description
The addfreespace plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-05-05
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The addfreespace plugin for WordPress contains a CSRF vulnerability due to missing nonce validation. Attackers can forge a request to change plugin settings and inject malicious scripts that will persist in the site and execute in future visits. This flaw enables a remote attacker to perform cross‑site scripting at the site user level, compromising the integrity and confidentiality of the site content. The weakness corresponds to CWE‑352.

Affected Systems

Vendors: kazunii addfreespace. Products: the addfreespace WordPress plugin, versions up to and including 0.1.3 are affected. No specific minor version gaps are listed beyond 0.1.3, so all releases of the plugin in that range are at risk.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in CISA KEV, suggesting exploitation is currently low probability but not impossible. Attackers would need to trick an administrator into visiting a crafted link to trigger the CSRF; once the settings are modified, the stored script will run for all users. Because the vulnerability relies on administrator interaction, it is not fully automated and requires social engineering.

Generated by OpenCVE AI on May 5, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the addfreespace plugin to a version that includes proper nonce validation; if no updated version exists, bypass future risk by uninstalling or disabling the plugin.
  • Restrict access to the plugin settings page by ensuring only trusted administrator accounts have access, and educate administrators not to click untrusted links.
  • Implement a web application firewall rule to block CSRF on the plugin's settings endpoint or require confirmation prompts before applying changes.

Generated by OpenCVE AI on May 5, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 02:45:00 +0000

Type Values Removed Values Added
Description The addfreespace plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title addfreespace <= 0.1.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting via Settings Page
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T02:26:54.012Z

Reserved: 2026-04-20T17:28:17.779Z

Link: CVE-2026-6701

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T03:16:00.790

Modified: 2026-05-05T03:16:00.790

Link: CVE-2026-6701

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T03:30:14Z

Weaknesses