The wp Time Machine plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.0. This is due to missing or incorrect nonce validation on the 'wpTimeMachineCore.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Apr 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The wp Time Machine plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.0. This is due to missing or incorrect nonce validation on the 'wpTimeMachineCore.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | wp Time Machine <= 3.4.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-02T09:21:45.939Z
Updated: 2025-04-02T13:54:34.479Z
Reserved: 2025-04-01T14:49:19.564Z
Link: CVE-2025-3097

Updated: 2025-04-02T13:54:29.302Z

Status : Awaiting Analysis
Published: 2025-04-02T10:15:19.967
Modified: 2025-04-02T14:58:07.527
Link: CVE-2025-3097

No data.