Description
The Notify Odoo plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the _updateSettings function. This makes it possible for unauthenticated attackers to change the Notify Odoo URL to an attacker-controlled URL and modify notification, tracking image, and allowed IP address settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-05-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Notify Odoo plugin for WordPress allows unauthenticated attackers to change the plugin URL, notification settings, tracking image URL, and allowed IP addresses by POSTing to the _updateSettings endpoint. Because the endpoint lacks proper nonce validation, a malicious request can be crafted and executed by tricking a site administrator into clicking a link, leading to unauthorized configuration changes that can redirect notifications or expose sensitive data. This vulnerability represents a typical CSRF weakness (CWE‑352).

Affected Systems

All installations of the Notify Odoo plugin from its introduction up to and including version 1.0.1 are vulnerable. The affected product is the Notify Odoo WordPress plugin maintained by pektsekye. Users running any of these versions are exposed to the flaw.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting current exploitation activity is low. The likely attack vector is a forged request sent to the administrator’s browser; the attacker must initially lures an admin user into executing a malicious link, after which the request updates sensitive settings without prior authorization.

Generated by OpenCVE AI on May 15, 2026 at 11:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Notify Odoo plugin to a version newer than 1.0.1 when available
  • Disable the Notify Odoo plugin or remove it entirely until a patched release is published
  • Verify that the plugin settings are restricted to trusted IP addresses and review all configuration changes for anomalies

Generated by OpenCVE AI on May 15, 2026 at 11:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Pektsekye
Pektsekye notify Odoo
Wordpress
Wordpress wordpress
Vendors & Products Pektsekye
Pektsekye notify Odoo
Wordpress
Wordpress wordpress

Fri, 15 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Notify Odoo plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the _updateSettings function. This makes it possible for unauthenticated attackers to change the Notify Odoo URL to an attacker-controlled URL and modify notification, tracking image, and allowed IP address settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Notify Odoo <= 1.0.1 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Pektsekye Notify Odoo
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-15T13:26:37.272Z

Reserved: 2026-05-12T17:51:25.536Z

Link: CVE-2026-8425

cve-icon Vulnrichment

Updated: 2026-05-15T13:26:32.176Z

cve-icon NVD

Status : Deferred

Published: 2026-05-15T09:16:17.807

Modified: 2026-05-15T14:08:50.797

Link: CVE-2026-8425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:30:43Z

Weaknesses