Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubadev
Arubadev aruba Hispeed Cache Wordpress Wordpress wordpress |
|
| Vendors & Products |
Arubadev
Arubadev aruba Hispeed Cache Wordpress Wordpress wordpress |
Fri, 10 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Aruba HiSpeed Cache <= 3.0.4 - Cross-Site Request Forgery to Plugin Settings Reset | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-10T12:18:06.324Z
Reserved: 2026-02-04T19:11:29.291Z
Link: CVE-2026-1924
Updated: 2026-04-10T12:18:00.849Z
Status : Deferred
Published: 2026-04-10T02:16:02.607
Modified: 2026-04-24T18:01:58.517
Link: CVE-2026-1924
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:27:08Z