First published: Fri Apr 25 2025(Updated: )
The Ajax Comment Form CST plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation via the 'acform_cst_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ajax Comment Form CST | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3867 is considered a medium severity vulnerability due to its potential for allowing unauthenticated attackers to perform malicious actions.
To fix CVE-2025-3867, update the Ajax Comment Form CST plugin to version 1.3 or later where the vulnerability has been addressed.
CVE-2025-3867 affects users of the Ajax Comment Form CST plugin for WordPress running versions up to and including 1.2.
CVE-2025-3867 is a Cross-Site Request Forgery (CSRF) vulnerability.
The impact of CVE-2025-3867 allows attackers to execute unauthorized actions on behalf of legitimate users, potentially compromising website integrity.