Description
The Skysa Text Ticker App plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the SkysaApps_Admin_AppPage function. This makes it possible for unauthenticated attackers to trick a site administrator into making a forged request to modify the plugin's settings, including the scrolling message text and URL, via a forged cross-site request via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-05-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Skysa Text Ticker App for WordPress contains a Cross‑Site Request Forgery flaw due to missing or incorrect nonce validation in the admin settings page. An attacker can supply a forged request that tricks an authenticated administrator into submitting altered configuration values, such as the scrolling message text and target URL. This flaw permits an attacker to deface the ticker, redirect site visitors to malicious destinations, or otherwise manipulate content that appears on the front‑end, thereby compromising content integrity and potentially user trust. The weakness is a classic CSRF vulnerability (CWE‑352).

Affected Systems

WordPress sites that have installed the Skysa Text Ticker App plugin, specifically versions 1.4 and earlier by vendor davidskysa. Any blog or content site running these plugin versions and having an active administrator account is susceptible.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk level; the EPSS score is not available and the vulnerability is not listed in CISA KEV. Exploitation requires an attacker to lure an administrator into clicking a crafted link or form, which is a feasible social‑engineering attack but not trivial. Vulnerability applies to unauthenticated attackers who can reach the site’s admin interface, thus the attack vector is primarily browser‑based web. While the flaw is not trivially exploitable, the potential impact on user experience and trust warrants prompt attention.

Generated by OpenCVE AI on May 12, 2026 at 11:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Skysa Text Ticker App to the latest available version that includes nonce validation; if no newer version exists, consider removing or replacing the plugin.
  • Disable or restrict the use of external URLs in the ticker settings to mitigate redirect‑based attacks, ensuring that only trusted HTTPS endpoints are accepted.
  • Implement two‑factor authentication for all administrator accounts and educate site owners to be wary of unexpected links that could trigger in‑browser requests.

Generated by OpenCVE AI on May 12, 2026 at 11:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Skysa Text Ticker App plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the SkysaApps_Admin_AppPage function. This makes it possible for unauthenticated attackers to trick a site administrator into making a forged request to modify the plugin's settings, including the scrolling message text and URL, via a forged cross-site request via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Skysa Text Ticker App <= 1.4 - Cross-Site Request Forgery to Settings Modification via 'Save Settings' Form
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T07:48:27.622Z

Reserved: 2026-04-20T18:17:50.558Z

Link: CVE-2026-6710

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:56.360

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-6710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T11:15:14Z

Weaknesses