CVE-2025-13144
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-05

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The ContentStudio plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.7. This is due to missing or insufficient nonce validation on the add_cstu_settings function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-05
Last Modified
2026-04-08
Generated
2026-05-06
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
contentstudio contentstudio_plugin 1.3.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the ContentStudio WordPress plugin is installed and running a version up to and including 1.3.7, which is vulnerable to CSRF due to missing or insufficient nonce validation on the add_cstu_settings function. To detect it on your system, you can verify the plugin version via WordPress admin or by inspecting the plugin files. On the network, you can monitor for suspicious POST requests to the plugin's settings endpoints that lack proper nonce tokens. Specific commands to check the plugin version on the server include: 1) Using WP-CLI: `wp plugin list | grep contentstudio` to see the installed version. 2) Searching plugin files for the vulnerable function: `grep -r add_cstu_settings wp-content/plugins/contentstudio/`. Additionally, you can inspect HTTP requests to the plugin's AJAX endpoints for missing or invalid nonce parameters using tools like curl or browser developer tools. For example, to test nonce validation, you might try sending a POST request without a nonce and observe if the settings are accepted. However, no exact detection commands are provided in the resources. [2]


Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) in the ContentStudio plugin for WordPress, affecting all versions up to and including 1.3.7. It occurs because the plugin's add_cstu_settings function lacks proper nonce validation, allowing unauthenticated attackers to modify plugin settings by tricking a site administrator into performing an action, such as clicking a malicious link.


How can this vulnerability impact me? :

An attacker can exploit this vulnerability to change the settings of the ContentStudio plugin without authorization by deceiving an administrator into clicking a crafted link. This could lead to unauthorized configuration changes, potentially affecting the security or functionality of the WordPress site.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the ContentStudio plugin for WordPress to a version later than 1.3.7 where the nonce validation issue is fixed. Additionally, avoid clicking on suspicious links and ensure that site administrators are aware of the risk of Cross-Site Request Forgery attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart