VYPR
Medium severity4.3NVD Advisory· Published Jan 7, 2026· Updated Apr 15, 2026

CVE-2025-14845

CVE-2025-14845

Description

The NS IE Compatibility Fixer plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 2.1.5. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The NS IE Compatibility Fixer plugin for WordPress lacks CSRF protection, allowing unauthenticated attackers to change plugin settings via a forged request.

Vulnerability

Analysis The NS IE Compatibility Fixer plugin for WordPress (all versions up to and including 2.1.5) is vulnerable to Cross-Site Request Forgery (CSRF) due to missing nonce validation on its settings update functionality. WordPress functions such as check_admin_referer() and wp_verify_nonce() are designed to protect admin actions against such attacks by verifying intent via a security nonce [1][2]. Without this protection, the plugin fails to confirm that a settings change request originated from an authenticated administrator's intentional action.

Exploitation

Prerequisites An unauthenticated attacker can exploit this vulnerability by crafting a malicious link that, when clicked by an authenticated administrator, triggers a settings modification. The attack requires social engineering to trick the administrator into performing the action (e.g., clicking a link while logged into their WordPress admin panel). No authentication is needed on the attacker's side, and the vulnerability can be exploited from any network position [2][3].

Impact

Successful exploitation allows the attacker to alter the plugin's configuration. Depending on the plugin's settings, this could lead to further compromise, such as disabling security features or enabling malicious behaviors. Since the plugin is intended to fix compatibility issues, changing settings could affect site functionality and user experience.

Mitigation

The vulnerability exists in all versions up to and including 2.1.5. The vendor has not released a patched version as of the publication date. Administrators should consider disabling the plugin until a fix is available, or implement additional controls such as Web Application Firewall (WAF) rules to detect CSRF attempts.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.