The Silencesoft RSS Reader plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.6. This is due to missing or incorrect nonce validation on the 'sil_rss_edit_page' page. This makes it possible for unauthenticated attackers to delete RSS feeds via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Aug 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Sat, 23 Aug 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Silencesoft RSS Reader plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.6. This is due to missing or incorrect nonce validation on the 'sil_rss_edit_page' page. This makes it possible for unauthenticated attackers to delete RSS feeds via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | Silencesoft RSS Reader <= 0.6 - Cross-Site Request Forgery to RSS Feed Deletion | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-23T04:25:47.397Z
Updated: 2025-08-23T04:25:47.397Z
Reserved: 2025-07-18T19:41:38.196Z
Link: CVE-2025-7842

No data.

Status : Received
Published: 2025-08-23T05:15:33.283
Modified: 2025-08-23T05:15:33.283
Link: CVE-2025-7842

No data.