CVE-2025-13143
BaseFortify
Publication date: 2025-11-27
Last updated on: 2025-11-27
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opinion_stage | poll_survey_quiz_maker_plugin | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the Poll, Survey & Quiz Maker Plugin by Opinion Stage for WordPress, affecting all versions up to and including 19.12.0. It occurs because the plugin lacks proper nonce validation in the disconnect_account_action function, allowing an attacker to trick a site administrator into performing an unwanted action, such as disconnecting the site from the Opinion Stage platform, via a forged request.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to disconnect your WordPress site from the Opinion Stage platform integration without your consent by tricking an administrator into clicking a malicious link. This could disrupt the functionality of polls, surveys, and quizzes that rely on this integration, potentially affecting user experience and site operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Poll, Survey & Quiz Maker Plugin by Opinion Stage to a version later than 19.12.0 where the nonce validation issue is fixed. Additionally, avoid clicking on suspicious links and ensure that site administrators are aware of the risk of Cross-Site Request Forgery attacks.