Medium severity4.3NVD Advisory· Published Sep 10, 2025· Updated Apr 15, 2026
CVE-2025-9622
CVE-2025-9622
Description
The WP Blast | SEO & Performance Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.6. This is due to missing or incorrect nonce validation on multiple administrative actions in the Settings class. This makes it possible for unauthenticated attackers to trigger cache purging, sitemap clearing, plugin data purging, and score resetting operations via forged requests granted they can trick a site administrator into performing an action such as clicking on a link.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/wpblast/tags/1.8.6/src/Smartfire/Wordpress/WPBlast/Settings.phpnvd
- plugins.trac.wordpress.org/browser/wpblast/tags/1.8.6/src/Smartfire/Wordpress/WPBlast/Settings.phpnvd
- plugins.trac.wordpress.org/browser/wpblast/tags/1.8.6/src/Smartfire/Wordpress/WPBlast/Settings.phpnvd
- plugins.trac.wordpress.org/browser/wpblast/tags/1.8.6/src/Smartfire/Wordpress/WPBlast/Settings.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/b8954061-cb8f-49fc-84d9-50851f7f48a2nvd
News mentions
0No linked articles in our index yet.