The WP Hallo Welt plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'hallo_welt_seite' function. This makes it possible for unauthenticated attackers to update plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to the insufficient input sanitization and output escaping, this can lead to Stored Cross-Site Scripting.
Metrics
Affected Vendors & Products
References
History
Sat, 20 Dec 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP Hallo Welt plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'hallo_welt_seite' function. This makes it possible for unauthenticated attackers to update plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to the insufficient input sanitization and output escaping, this can lead to Stored Cross-Site Scripting. | |
| Title | WP Hallo Welt <= 1.4. - Cross-Site Request Forgery to Stored Cross-Site Scripting | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-20T03:20:25.202Z
Reserved: 2025-11-18T17:08:35.108Z
Link: CVE-2025-13365
No data.
Status : Received
Published: 2025-12-20T04:16:07.367
Modified: 2025-12-20T04:16:07.367
Link: CVE-2025-13365
No data.
OpenCVE Enrichment
No data.