Description
The BMLT WordPress Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.11.4. This is due to missing nonce validation on the 'BMLTPlugin_create_option' and 'BMLTPlugin_delete_option ' action. This makes it possible for unauthenticated attackers to create new plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Problem types
CWE-352 Cross-Site Request Forgery (CSRF)
Product status
* (semver)
Timeline
| 2025-12-11: | Disclosed |
Credits
Muhammad Nur Ibnu Hubab
References
www.wordfence.com/...-f5f9-4729-ade0-cba6289406de?source=cve
plugins.trac.wordpress.org/.../bmlt-cms-satellite-plugin.php
plugins.trac.wordpress.org/.../bmlt-cms-satellite-plugin.php
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.