The OceanWP theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 4.0.9 to 4.1.1. This is due to missing or incorrect nonce validation on the oceanwp_notice_button_click() function. This makes it possible for unauthenticated attackers to install the Ocean Extra plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
| Link | Resource |
|---|---|
| https://research.cleantalk.org/cve-2025-8891/ | Exploit Third Party Advisory |
| https://themes.trac.wordpress.org/changeset/283264/oceanwp/4.1.2/inc/activation-notice/api.php | Patch |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/9c6f9a3d-54a6-4405-b42b-37fc8342af96?source=cve | Third Party Advisory |
| https://research.cleantalk.org/cve-2025-8891/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-13 04:16
Updated : 2025-12-18 17:40
NVD link : CVE-2025-8891
Mitre link : CVE-2025-8891
CVE.ORG link : CVE-2025-8891
JSON object : View
Products Affected
oceanwp
- oceanwp
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
