Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Saturngod
Saturngod zawgyi Embed Wordpress Wordpress wordpress |
|
| Vendors & Products |
Saturngod
Saturngod zawgyi Embed Wordpress Wordpress wordpress |
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Zawgyi Embed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing or incorrect nonce validation on the zawgyi_adminpage function. This makes it possible for unauthenticated attackers to update the plugin's zawgyi_forceCSS setting by submitting a forged POST request to options-general.php?page=zawgyi_embed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Zawgyi Embed <= 2.1.1 - Cross-Site Request Forgery via 'zawgyi_forceCSS' Parameter | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-12T12:50:30.167Z
Reserved: 2026-05-01T13:12:15.290Z
Link: CVE-2026-7616
Updated: 2026-05-12T12:50:20.976Z
Status : Deferred
Published: 2026-05-12T09:16:57.590
Modified: 2026-05-12T14:03:52.757
Link: CVE-2026-7616
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:39:38Z