CVE-2023-7196: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Ultimate Noindex Nofollow Tool
The Ultimate Noindex Nofollow Tool WordPress plugin through 1.1.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI Analysis
Technical Summary
CVE-2023-7196 is a medium severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) affecting the Ultimate Noindex Nofollow Tool WordPress plugin up to version 1.1.2. This plugin is used to manage SEO-related settings by controlling the noindex and nofollow meta tags on WordPress sites. The vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, it does not implement anti-CSRF tokens or other verification mechanisms to ensure that requests to change settings originate from legitimate, authenticated users. As a result, an attacker can craft a malicious web page or link that, when visited by a logged-in WordPress administrator, causes the admin’s browser to unknowingly submit a request to modify the plugin’s settings. This could lead to unauthorized changes in SEO configurations, potentially impacting site visibility and behavior. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack requires user interaction (the admin must visit a malicious page), no privileges are required to initiate the attack, and the impact is limited to integrity (unauthorized changes) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is network exploitable and has low attack complexity, but requires a logged-in administrator to be tricked into performing the action.
Potential Impact
For European organizations running WordPress sites with the Ultimate Noindex Nofollow Tool plugin, this vulnerability could allow attackers to alter SEO-related settings without authorization. While this does not directly compromise sensitive data or site availability, unauthorized changes to noindex/nofollow tags can negatively affect search engine indexing, leading to reduced site visibility, traffic loss, and potential reputational damage. For businesses relying heavily on organic search traffic, this can translate into financial impact and diminished competitive advantage. Additionally, if attackers combine this with other vulnerabilities or social engineering, it could be part of a broader attack chain. The impact is primarily on the integrity of site configuration and indirectly on business operations dependent on web presence.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the Ultimate Noindex Nofollow Tool plugin and verify the version in use. Until an official patch is released, administrators should restrict access to the WordPress admin interface to trusted networks or VPNs to reduce exposure. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like requests targeting the plugin’s settings endpoints can provide temporary protection. Educate administrators to avoid clicking on untrusted links while logged into WordPress. Monitoring changes to SEO settings and maintaining regular backups of configuration can help detect and recover from unauthorized modifications. Once a patch is available, apply it promptly. Additionally, plugin developers and site maintainers should enforce CSRF tokens and nonce verification for all state-changing requests to prevent such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-7196: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Ultimate Noindex Nofollow Tool
Description
The Ultimate Noindex Nofollow Tool WordPress plugin through 1.1.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI-Powered Analysis
Technical Analysis
CVE-2023-7196 is a medium severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) affecting the Ultimate Noindex Nofollow Tool WordPress plugin up to version 1.1.2. This plugin is used to manage SEO-related settings by controlling the noindex and nofollow meta tags on WordPress sites. The vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, it does not implement anti-CSRF tokens or other verification mechanisms to ensure that requests to change settings originate from legitimate, authenticated users. As a result, an attacker can craft a malicious web page or link that, when visited by a logged-in WordPress administrator, causes the admin’s browser to unknowingly submit a request to modify the plugin’s settings. This could lead to unauthorized changes in SEO configurations, potentially impacting site visibility and behavior. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack requires user interaction (the admin must visit a malicious page), no privileges are required to initiate the attack, and the impact is limited to integrity (unauthorized changes) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is network exploitable and has low attack complexity, but requires a logged-in administrator to be tricked into performing the action.
Potential Impact
For European organizations running WordPress sites with the Ultimate Noindex Nofollow Tool plugin, this vulnerability could allow attackers to alter SEO-related settings without authorization. While this does not directly compromise sensitive data or site availability, unauthorized changes to noindex/nofollow tags can negatively affect search engine indexing, leading to reduced site visibility, traffic loss, and potential reputational damage. For businesses relying heavily on organic search traffic, this can translate into financial impact and diminished competitive advantage. Additionally, if attackers combine this with other vulnerabilities or social engineering, it could be part of a broader attack chain. The impact is primarily on the integrity of site configuration and indirectly on business operations dependent on web presence.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the Ultimate Noindex Nofollow Tool plugin and verify the version in use. Until an official patch is released, administrators should restrict access to the WordPress admin interface to trusted networks or VPNs to reduce exposure. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like requests targeting the plugin’s settings endpoints can provide temporary protection. Educate administrators to avoid clicking on untrusted links while logged into WordPress. Monitoring changes to SEO settings and maintaining regular backups of configuration can help detect and recover from unauthorized modifications. Once a patch is available, apply it promptly. Additionally, plugin developers and site maintainers should enforce CSRF tokens and nonce verification for all state-changing requests to prevent such vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-01-01T18:01:58.732Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeafd8
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 11:11:30 AM
Last updated: 8/13/2025, 10:24:12 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.