Cross-Site Request Forgery Vulnerability in Simple Page Access Restriction Plugin by WordPress
CVE-2025-5142

6.5MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
30 May 2025

What is CVE-2025-5142?

The Simple Page Access Restriction plugin for WordPress is susceptible to a Cross-Site Request Forgery attack due to improper nonce validation and capability checks in its settings.php script. As a result, unauthorized users could potentially manipulate access settings for all post types or taxonomies, altering the visibility of new postings regardless of the intended privacy settings. Additionally, this vulnerability may lead to the unintended deletion of plugin data upon removal, as well as the risk of URL redirection attacks if an administrator is tricked into interacting with a compromised link.

Affected Version(s)

Simple Page Access Restriction * <= 1.0.31

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonas Benjamin Friedli
.
CVE-2025-5142 : Cross-Site Request Forgery Vulnerability in Simple Page Access Restriction Plugin by WordPress