Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15376: CWE-352 Cross-Site Request Forgery (CSRF) in rndsand81 Stopwords for comments

0
Medium
VulnerabilityCVE-2025-15376cvecve-2025-15376cwe-352
Published: Wed Jan 14 2026 (01/14/2026, 06:40:08 UTC)
Source: CVE Database V5
Vendor/Project: rndsand81
Product: Stopwords for comments

Description

The Stopwords for comments plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing nonce validation on the 'set_stopwords_for_comments' and 'delete_stopwords_for_comments' functions. This makes it possible for unauthenticated attackers to add or delete stopwords via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 01/14/2026, 07:19:33 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15376 affects the 'Stopwords for comments' WordPress plugin developed by rndsand81. This plugin is designed to manage stopwords used to filter comments on WordPress sites. The issue is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, caused by the absence of nonce validation in the 'set_stopwords_for_comments' and 'delete_stopwords_for_comments' functions. Nonce validation is a security mechanism in WordPress that helps ensure that requests made to perform sensitive actions originate from legitimate users and not from malicious third parties. Because this validation is missing, an attacker can craft a malicious link or request that, when clicked or executed by an authenticated administrator, can add or delete stopwords without their explicit consent. This manipulation can alter the filtering behavior of comments, potentially allowing undesirable content to bypass filters or legitimate content to be blocked. The vulnerability requires no prior authentication but does require user interaction (an admin clicking a link). The CVSS v3.1 score is 4.3, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, user interaction required, and impact limited to integrity. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly. The scope is limited to the plugin's configuration and does not directly affect site confidentiality or availability but can indirectly impact content integrity and site moderation policies.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress comment moderation systems. By manipulating stopwords, attackers can influence which comments are filtered or allowed, potentially enabling spam, malicious links, or inappropriate content to appear on websites. This can damage brand reputation, reduce user trust, and increase the workload on moderation teams. While the vulnerability does not directly compromise sensitive data or site availability, it can be leveraged as a stepping stone for social engineering or further attacks if attackers embed malicious content in comments. Organizations relying on WordPress for customer engagement, especially those in sectors like e-commerce, media, or public services, may face reputational and operational impacts. The requirement for administrator interaction limits the attack surface but does not eliminate risk, especially in environments where administrators may be targeted with phishing or social engineering campaigns. Given the widespread use of WordPress across Europe, the potential impact is significant if left unmitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the 'Stopwords for comments' plugin and identify the version in use. Since no official patch is currently available, administrators should consider the following specific actions: 1) Restrict administrative access to trusted personnel and enforce strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2) Educate administrators about phishing and social engineering tactics to prevent inadvertent clicking on malicious links. 3) Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 4) Temporarily disable or remove the plugin if it is not critical to operations until a patch is released. 5) Monitor logs for unusual activity related to stopwords modification. 6) Follow the plugin vendor’s updates closely and apply patches immediately upon release. 7) Consider adding custom nonce validation or CSRF protections via plugin customization if feasible. These targeted measures go beyond generic advice and address the specific attack vectors and exploitation conditions of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-30T19:57:19.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69673f948330e06716b84f84

Added to database: 1/14/2026, 7:02:44 AM

Last enriched: 1/14/2026, 7:19:33 AM

Last updated: 1/14/2026, 3:30:06 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats