- Description
- The MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Wallet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the adminOptions() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Source
- security@wordfence.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-352
- Hype score
- Not currently trending
CVE-2025-5937 Cross-Site Request Forgery in MicroPayments WordPress Plugin Settings Reset https://t.co/ZPcNNvPp50
@VulmonFeeds
28 Jun 2025
80 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-5937 The MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Wallet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up… https://t.co/FH4Ej4HLYS
@CVEnew
28 Jun 2025
290 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:videowhisper:micropayments:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "D1C387DC-62C3-496B-B891-B6A65A3CFD45",
"versionEndExcluding": "3.2.1"
}
],
"operator": "OR"
}
]
}
]