VYPR
Medium severity4.3NVD Advisory· Published Apr 24, 2025· Updated Apr 23, 2026

CVE-2025-46462

CVE-2025-46462

Description

Cross-Site Request Forgery (CSRF) vulnerability in Trân Minh-Quân WPVN wpvn-username-changer allows Cross Site Request Forgery.This issue affects WPVN: from n/a through <= 0.7.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF in WPVN Username Changer plugin (≤0.7.8) lets attackers force authenticated admins to perform unwanted actions.

The WPVN Username Changer WordPress plugin, up to and including version 0.7.8, contains a Cross-Site Request Forgery (CSRF) vulnerability. This flaw exists due to missing or insufficient nonce validation on certain plugin requests, allowing attackers to craft malicious links or forms that, when clicked by an authenticated administrator, can trigger unwanted actions without the admin's consent [1].

Exploitation does not require any special privileges for the attacker, but relies on social engineering to trick a logged-in administrator into interacting with a crafted request. For example, the admin may be lured to click a malicious link or submit a form on a third-party site while authenticated to the WordPress dashboard. As noted in the advisory, this kind of vulnerability is frequently abused in mass-exploit campaigns targeting thousands of sites regardless of their size or popularity [1].

Successful exploitation could allow an attacker to force the administrator to perform unintended actions under their current session, such as changing account settings or other configuration changes the plugin provides. The CVSS v3 base score of 4.3 (Medium) reflects the requirement for user interaction and the need for an authenticated session [1].

The recommended mitigation is to update the plugin to a patched version, if available. Since the affected version is 0.7.8 and earlier, users should check for updates immediately. If updating is not possible, contacting the hosting provider or a web developer for assistance is advised [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.