WordPress Plugin Curtain 1.0.2 contains a cross-site request forgery vulnerability that allows attackers to activate or deactivate site maintenance mode by crafting malicious requests. Attackers can trick authenticated administrators into submitting forged requests to the options-general.php page with curtain parameters to toggle maintenance mode without valid nonce validation.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin Curtain 1.0.2 contains a cross-site request forgery vulnerability that allows attackers to activate or deactivate site maintenance mode by crafting malicious requests. Attackers can trick authenticated administrators into submitting forged requests to the options-general.php page with curtain parameters to toggle maintenance mode without valid nonce validation. | |
| Title | WordPress Plugin Curtain 1.0.2 Cross-site Request Forgery | |
| First Time appeared |
Curtain Project
Curtain Project curtain |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:curtain_project:curtain:1.0.2:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Curtain Project
Curtain Project curtain |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:12:50.628Z
Reserved: 2026-01-11T13:34:26.332Z
Link: CVE-2022-50955
No data.
No data.
No data.
OpenCVE Enrichment
No data.
Weaknesses