CVE-2026-1394
متوسطة / Medium
CVSS 4,3
VULNERABILITY BRIEF
CVE-2026-1394
المصدر الرسمي: NVD
مستوى الخطورة
متوسطة (Medium)
درجة CVSS
4,3
حالة الاستغلال KEV
غير مدرجة حاليًا
تاريخ النشر
2026-02-14
وصف الثغرة
The WP Quick Contact Us plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
الأثر المحتمل
لم تتوفر تفاصيل إضافية في المصدر الرسمي.
التوصيات والمعالجة
لم تتوفر تفاصيل إضافية في المصدر الرسمي.\nراجع روابط المصدر الرسمية.
حالة الاستغلال (KEV)
لا يوجد إدراج حاليًا في قائمة KEV.
المراجع الرسمية
- https://plugins.trac.wordpress.org/browser/wp-quick-contact-us/tags/1.0/wp-quick-contact-us.php#L228
- https://plugins.trac.wordpress.org/browser/wp-quick-contact-us/trunk/wp-quick-contact-us.php#L228
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ab1053e4-5135-49cc-a81b-9cf66e93bfef?source=cve
English Technical Fields
Description: The WP Quick Contact Us plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N