Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fusewp
Fusewp fusewp Wordpress Wordpress wordpress |
|
| Vendors & Products |
Fusewp
Fusewp fusewp Wordpress Wordpress wordpress |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Oct 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.23.0. This is due to missing or incorrect nonce validation on the save_changes function. This makes it possible for unauthenticated attackers to add or edit sync rules via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) <= 1.1.23.0 - Cross-Site Request Forgery to Sync Rule Creation | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:29:54.970Z
Reserved: 2025-10-20T16:07:42.381Z
Link: CVE-2025-11976
Updated: 2025-10-27T15:32:55.290Z
Status : Deferred
Published: 2025-10-25T07:15:40.737
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11976
No data.
OpenCVE Enrichment
Updated: 2026-04-22T06:15:10Z