CVE-2025-48303
BaseFortify
Publication date: 2025-08-25
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | post_type_converter | 0.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the WordPress Post Type Converter plugin (up to version 0.6). It allows an attacker to trick authenticated users with higher privileges into performing unauthorized actions on the site without their consent, potentially compromising the site's integrity. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized actions being executed by privileged users without their knowledge, which may compromise the integrity of your WordPress site. Since the plugin is abandoned and no official fix is available, the risk persists unless mitigated by virtual patching or removing the plugin. This could result in security breaches or misuse of site functionality. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate steps to mitigate this vulnerability include removing and replacing the Post Type Converter plugin, as it is abandoned and no official fix is available. Applying a virtual patch (vPatch) provided by Patchstack can offer immediate protection. Users should consider alternative software and seek professional incident response if compromise is suspected. Simply deactivating the plugin does not eliminate the risk. [1]