Plugin Vulnerability Hub
Plugin 1 known issue Latest disclosed Mar 24, 2025

GP Back To Top Vulnerabilities

Review known vulnerability records for the WordPress plugin GP Back To Top (`gp-back-to-top`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-30521, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
1
High or Critical
0
Patch Coverage
100%
Last Updated
Apr 01, 2025
Priority CVE Quick Links

Fast paths into GP Back To Top CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
1
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for GP Back To Top so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
1 record include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 0 high severity findings.
Recent CVEs
CVE-2025-30521
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for GP Back To Top

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: No CVE-2025-30521
CVE-2025-30521: GP Back To Top <= 3.0 - Cross-Site Request Forgery

The GP Back To Top plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized actio...

Published
Mar 24, 2025
Patched Release
Not published
Affected Versions
Versions up to 3.0
Next Step
Open the full report for remediation notes and references.