Impact
The JaviBola Custom Theme Test plugin contains a CSRF flaw in the options page because the nonce is missing or malformed. An unauthenticated attacker who can entice a logged‑in administrator to visit a crafted URL can force the site to switch to a theme chosen by the attacker. This does not expose secrets directly but can alter site appearance, potentially trigger additional vulnerabilities in the chosen theme, and may provide a foothold for further attacks. The vulnerability is classified as CWE‑352.
Affected Systems
WordPress sites running the JaviBola Custom Theme Test plugin version 2.0.5 or earlier. The plugin is distributed on the WordPress plugin repository and may appear on any WordPress installation that has installed this plugin.
Risk and Exploitability
The flaw has a CVSS score of 4.3, indicating moderate technical impact. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation data. The attack vector is inferred to be a web‑based CSRF, where an impersonated request must be sent from a browser session that has an authenticated administrator. The attacker requires social engineering to have the admin click a malicious link or submit a forged form.
OpenCVE Enrichment