Time Sheets Vulnerability (Medium) – CVE-2025-10055

Time Sheets Vulnerability (Medium) – CVE-2025-10055

by | Mar 9, 2026 | Plugins

Attack Vectors

Time Sheets (WordPress plugin slug: time-sheets) is affected by a Medium-severity Cross-Site Request Forgery (CSRF) vulnerability (CVE-2025-10055, CVE record). The published score is CVSS 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).

CSRF is most often triggered when a logged-in user with privileges (typically an administrator) is tricked into clicking a link, opening an email, or visiting a webpage that silently submits a request to your WordPress site in the background. In this case, the attacker does not need to authenticate, but does need the administrator’s browser session to be active and to induce that “one click” or page view (user interaction is required).

Because the issue affects “several endpoints,” risk depends on which Time Sheets actions those endpoints control in your environment (for example, settings changes or operational actions). Even if the attacker cannot read data directly, CSRF can still be used to change something, which is often enough to create business disruption or open a door for follow-on abuse.

Security Weakness

The vulnerability is caused by missing or incorrect nonce validation on multiple endpoints. In WordPress, nonces are a standard protection to ensure that sensitive actions are intentionally initiated by an authenticated user (and not by a forged request from another site). When nonce validation is absent or implemented incorrectly, the site can accept requests that “look legitimate” even when they were initiated by an attacker-controlled page.

According to the source advisory, all versions of Time Sheets up to and including 2.1.3 are impacted, and there is no known patch available at the time of writing. That materially changes the risk calculus for business owners: you may be choosing between continued exposure versus removing/replacing the plugin.

Technical or Business Impacts

With a CSRF flaw, the most direct outcome is unauthorized changes performed under an administrator’s identity. Depending on which Time Sheets endpoints are vulnerable, this can lead to workflow disruption, unexpected configuration changes, or other unauthorized actions that undermine operational integrity.

From a business-risk perspective, the impacts typically include:

Operational disruption: changes that affect time tracking workflows can create payroll and billing friction, slow down approvals, or force manual reconciliation.

Compliance and audit concerns: unauthorized or unexplained changes may complicate audit trails, internal controls, and incident response obligations—especially where time records support billing, labor compliance, or client reporting.

Reputational and client-impact risk: if time reporting becomes unreliable or service delivery is delayed while the issue is investigated, clients may question process maturity and data governance.

Risk management note: because no patch is currently available, organizations should consider mitigation steps aligned to their risk tolerance—often including uninstalling Time Sheets and replacing it with a supported alternative. If immediate removal is not feasible, reduce exposure by limiting administrator browsing risk (separate admin browser profile/device, stricter link/email handling), enforcing MFA for admin accounts, and minimizing the number of users with admin privileges.

Similar Attacks

CSRF is a widely exploited class of web attack because it leverages trusted user sessions rather than “breaking in” directly. For non-technical stakeholders, these references provide real, practical examples of how CSRF is used to trigger unauthorized actions and why protections like nonce/anti-CSRF tokens matter:

OWASP: Cross-Site Request Forgery (CSRF) (examples and common exploitation patterns)

PortSwigger Web Security Academy: CSRF (step-by-step demonstrations of CSRF scenarios)

MITRE CWE-352: Cross-Site Request Forgery (CSRF) (industry-standard weakness definition used in risk and compliance programs)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers