The Conditional Maintenance Mode for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation when toggling the maintenance mode status. This makes it possible for unauthenticated attackers to enable or disable the site's maintenance mode via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Conditional Maintenance Mode for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation when toggling the maintenance mode status. This makes it possible for unauthenticated attackers to enable or disable the site's maintenance mode via a forged request granted they can trick an administrator into performing an action such as clicking on a link. | |
| Title | Conditional Maintenance Mode for WordPress <= 1.0.0 - Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-11-25T07:28:20.635Z
Updated: 2025-11-25T15:05:26.995Z
Reserved: 2025-10-31T22:24:37.442Z
Link: CVE-2025-12586
Updated: 2025-11-25T15:05:23.666Z
Status : Awaiting Analysis
Published: 2025-11-25T08:15:48.707
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-12586
No data.