CVE-2025-47470
Description
Cross-Site Request Forgery (CSRF) vulnerability in senols GPT3 AI Content Writer gpt3-ai-content-generator allows Cross Site Request Forgery.This issue affects GPT3 AI Content Writer: from n/a through <= 1.9.14.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in GPT3 AI Content Writer plugin (≤1.9.14) lets attackers trick privileged users into unwanted actions, fixed in 1.9.15.
The GPT3 AI Content Writer plugin for WordPress (all versions up to and including 1.9.14) contains a Cross-Site Request Forgery (CSRF) vulnerability. The root cause is the lack of proper CSRF token validation on state-changing requests, allowing an attacker to forge requests on behalf of an authenticated administrator or other privileged user. [1]
Exploitation requires user interaction: a privileged user must be tricked into clicking a malicious link, visiting a crafted page, or submitting a form while authenticated to the WordPress site. No additional authentication is needed from the attacker beyond the victim user's existing session. [1]
A successful CSRF attack could force the victim to perform unwanted actions under their current authentication level, such as generating AI content or changing plugin settings. The CVSS score of 4.3 (Medium) reflects the need for user interaction and the limited direct impact but acknowledges potential for abuse in automated campaigns. [1]
The vulnerability has been patched in version 1.9.15. Users are strongly advised to update immediately. The vendor and Patchstack recommend enabling auto-updates for vulnerable plugins to mitigate against mass-exploit attempts. [1]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.9.14
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.