Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chsxf
Chsxf mcatfilter Wordpress Wordpress wordpress |
|
| Vendors & Products |
Chsxf
Chsxf mcatfilter Wordpress Wordpress wordpress |
Wed, 22 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The mCatFilter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.5.2. This is due to the complete absence of nonce verification and capability checks in the compute_post() function, which processes settings updates. The compute_post() function is called in the plugin constructor on every page load via the plugins_loaded hook, and it directly processes $_POST data to modify plugin settings via update_option() without any CSRF token validation. This makes it possible for unauthenticated attackers to modify all plugin settings, including category exclusion rules, feed exclusion flags, and tag page exclusion flags, via a forged POST request, granted they can trick a site administrator into performing an action such as clicking a link. | |
| Title | mCatFilter <= 0.5.2 - Cross-Site Request Forgery via compute_post() Function | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-22T15:31:40.591Z
Reserved: 2026-03-13T15:29:31.027Z
Link: CVE-2026-4139
Updated: 2026-04-22T15:25:49.922Z
Status : Deferred
Published: 2026-04-22T09:16:24.707
Modified: 2026-04-22T20:22:50.570
Link: CVE-2026-4139
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:44:07Z