Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Taqnix
Taqnix taqnix Wordpress Wordpress wordpress |
|
| Vendors & Products |
Taqnix
Taqnix taqnix Wordpress Wordpress wordpress |
Sat, 25 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Taqnix plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to a missing nonce verification in the taqnix_delete_my_account() function, where the check_ajax_referer() call is explicitly commented out on line 883. This makes it possible for unauthenticated attackers to trick a logged-in non-administrator user into deleting their own account via a forged request granted they can trick the user into performing an action such as clicking a link or visiting a malicious page. | |
| Title | Taqnix <= 1.0.3 - Cross-Site Request Forgery to Account Deletion via 'taqnix_delete_my_account' AJAX Action | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-24T10:45:45.660Z
Reserved: 2026-03-04T20:28:38.759Z
Link: CVE-2026-3565
Updated: 2026-04-24T10:45:35.982Z
Status : Deferred
Published: 2026-04-24T08:16:30.073
Modified: 2026-04-24T14:38:26.740
Link: CVE-2026-3565
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:18:06Z