CVE-2025-47681
Description
Cross-Site Request Forgery (CSRF) vulnerability in Ability, Inc Web Accessibility with Max Access accessibility-toolbar allows Cross Site Request Forgery.This issue affects Web Accessibility with Max Access: from n/a through <= 2.0.9.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in the WordPress Web Accessibility with Max Access plugin allows attackers to force privileged users to execute unintended actions.
Vulnerability
Overview CVE-2025-47681 is a Cross-Site Request Forgery (CSRF) vulnerability found in the Web Accessibility with Max Access plugin for WordPress, developed by Ability, Inc. The issue affects all versions up to and including 2.0.9. The root cause is insufficient validation of request origins in the plugin's accessibility-toolbar component, enabling an attacker to craft forged requests that appear legitimate to an authenticated administrator [1].
Attack
Vector and Exploitation Exploitation requires user interaction: a privileged user (such as an administrator) must be tricked into clicking a malicious link, visiting a crafted page, or submitting a form while authenticated. No prior authentication is needed for the attacker beyond the victim's active session. This makes the attack suitable for widespread, automated campaigns targeting thousands of sites simultaneously [1].
Potential
Impact A successful CSRF attack can force the victim's browser to perform unintended actions under their current authentication, such as changing plugin settings, modifying accessibility configurations, or performing other administrative operations without the user's consent. The CVSS v3 score is 4.3 (Medium), reflecting the need for user interaction and the specific privileges required [1].
Mitigation and
Remediation The vendor has released version 2.1.0, which resolves the vulnerability. Users are strongly advised to update to this version or later. For sites unable to update immediately, hosting providers or developers should be contacted for assistance. Patchstack users can enable auto-updates for vulnerable plugins. While the issue is considered low severity and unlikely to be mass-exploited, proactive patching is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.0.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.