Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 28 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Stop Spammers Classic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2026.1. This is due to missing nonce validation in the ss_addtoallowlist class. This makes it possible for unauthenticated attackers to add arbitrary email addresses to the spam allowlist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The vulnerability was partially patched in version 2026.1. | |
| Title | Stop Spammers Classic <= 2026.1 - Cross-Site Request Forgery via Email Allowlist | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:55:49.327Z
Reserved: 2025-12-16T18:04:36.930Z
Link: CVE-2025-14795
Updated: 2026-01-28T14:28:38.521Z
Status : Deferred
Published: 2026-01-28T14:16:02.473
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14795
No data.
OpenCVE Enrichment
Updated: 2026-04-21T16:15:40Z