Cross-Site Request Forgery Vulnerability in FuseWP WordPress Plugin
CVE-2025-11976

4.3MEDIUM

What is CVE-2025-11976?

The FuseWP plugin, used for syncing WordPress users to various email marketing platforms, is susceptible to Cross-Site Request Forgery due to inadequate nonce validation in its save_changes function. This vulnerability allows unauthenticated attackers the potential to modify sync rules by tricking an administrator into executing specific actions. The flaw exists in all versions up to and including 1.1.23.0, underscoring the need for immediate attention to ensure the security of WordPress installations using this plugin.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) * <= 1.1.23.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonas Benjamin Friedli
.