CVE-2022-50955
Description
WordPress Plugin Curtain 1.0.2 contains a cross-site request forgery vulnerability that allows attackers to activate or deactivate site maintenance mode by crafting malicious requests. Attackers can trick authenticated administrators into submitting forged requests to the options-general.php page with curtain parameters to toggle maintenance mode without valid nonce validation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WordPress Plugin Curtain 1.0.2 is vulnerable to 1.0.2 lacks CSRF protections, allowing attackers to toggle site maintenance mode by tricking an authenticated administrator.
Vulnerability
Details
WordPress Plugin Curtain versions up to 1.0.2 contain a cross-site request forgery (CSRF) vulnerability in the options-general.php page. The plugin fails to validate a nonce (security token) when processing curtain parameters, specifically the mode parameter that controls site maintenance mode activation or deactivation [1][2]. This allows an attacker to forge requests that can alter the maintenance state without the administrator's knowledge.
Exploitation
An attacker can craft a malicious HTML form or link that submits a forged request to the vulnerable endpoint. The exploit requires no authentication from the attacker, but relies on social engineering to trick an authenticated WordPress administrator into executing the request (e.g., by visiting a crafted page or clicking a link). The example proof-of-concept uses a self-submitting form with empty nonce and a mode parameter set to 0 or 1 to toggle the maintenance state [2].
Impact and
Mitigation
Successful exploitation allows an attacker to activate or deactivate maintenance mode, which can cause denial of service (by making the site inaccessible to visitors) or disrupt normal operations. As of the latest information, no patched version of the Curtain plugin has been released, and the plugin may be unsupported. Administrators are advised to disable or remove the plugin if it is not essential, or implement additional security controls (e.g., custom nonce checks) as a workaround [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: = 1.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
3- NHS to close-source hundreds of GitHub repos over AI, security concernsThe Register Security · May 5, 2026
- ClickFix Phishing Campaign Masquerading as a Claude InstallerRapid7 Blog · Apr 16, 2026
- Inside CrowdStrike Automated Leads: A Transformative Approach to Threat DetectionsCrowdStrike Blog