CVE-2026-1076: CWE-352 Cross-Site Request Forgery (CSRF) in bramdnl Star Review Manager
The Star Review Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.2. This is due to missing nonce validation on the settings page. This makes it possible for unauthenticated attackers to update the plugin's CSS settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2026-1076 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Star Review Manager plugin for WordPress, versions up to and including 1.2.2. The vulnerability stems from the absence of nonce validation on the plugin’s settings page, which is a critical security control designed to verify that requests originate from legitimate users. Without this validation, an attacker can craft a malicious web request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), causes unauthorized changes to the plugin’s CSS settings. This manipulation could alter the visual presentation of reviews or other UI elements managed by the plugin, potentially misleading users or damaging the site’s reputation. The attack vector is remote and requires no prior authentication, but it does require user interaction (the administrator must be tricked into clicking the malicious link). The vulnerability does not expose sensitive data or disrupt service availability but compromises the integrity of the plugin’s configuration. The CVSS 3.1 base score is 4.3, reflecting a medium severity level due to the limited impact scope and the need for user interaction. No patches or exploits are currently documented, but the risk remains for sites using vulnerable versions of this plugin.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of websites using the Star Review Manager plugin by enabling unauthorized modification of CSS settings. While it does not directly compromise sensitive data or availability, altered CSS can degrade user experience, damage brand trust, or facilitate further social engineering attacks by manipulating site appearance. Organizations in sectors relying heavily on customer reviews and reputation management—such as e-commerce, hospitality, and local services—may face reputational harm if attackers exploit this flaw. Additionally, compromised visual elements could be used to mislead users or inject malicious content indirectly. Since the attack requires an administrator to be tricked, organizations with less security-aware staff are at higher risk. The vulnerability’s medium severity suggests it is not critical but should be addressed promptly to maintain website integrity and trustworthiness.
Mitigation Recommendations
To mitigate CVE-2026-1076, organizations should immediately update the Star Review Manager plugin to a version that includes nonce validation once available. Until a patch is released, administrators should implement strict access controls limiting who can access the plugin’s settings page and avoid clicking on suspicious links or emails. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin’s endpoints can reduce risk. Additionally, administrators should enable multi-factor authentication (MFA) on WordPress accounts to reduce the likelihood of account compromise. Regular security awareness training focusing on phishing and social engineering can help prevent the user interaction required for exploitation. Monitoring website appearance for unauthorized changes and maintaining regular backups will aid in rapid recovery if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-1076: CWE-352 Cross-Site Request Forgery (CSRF) in bramdnl Star Review Manager
Description
The Star Review Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.2. This is due to missing nonce validation on the settings page. This makes it possible for unauthenticated attackers to update the plugin's CSS settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2026-1076 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Star Review Manager plugin for WordPress, versions up to and including 1.2.2. The vulnerability stems from the absence of nonce validation on the plugin’s settings page, which is a critical security control designed to verify that requests originate from legitimate users. Without this validation, an attacker can craft a malicious web request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), causes unauthorized changes to the plugin’s CSS settings. This manipulation could alter the visual presentation of reviews or other UI elements managed by the plugin, potentially misleading users or damaging the site’s reputation. The attack vector is remote and requires no prior authentication, but it does require user interaction (the administrator must be tricked into clicking the malicious link). The vulnerability does not expose sensitive data or disrupt service availability but compromises the integrity of the plugin’s configuration. The CVSS 3.1 base score is 4.3, reflecting a medium severity level due to the limited impact scope and the need for user interaction. No patches or exploits are currently documented, but the risk remains for sites using vulnerable versions of this plugin.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of websites using the Star Review Manager plugin by enabling unauthorized modification of CSS settings. While it does not directly compromise sensitive data or availability, altered CSS can degrade user experience, damage brand trust, or facilitate further social engineering attacks by manipulating site appearance. Organizations in sectors relying heavily on customer reviews and reputation management—such as e-commerce, hospitality, and local services—may face reputational harm if attackers exploit this flaw. Additionally, compromised visual elements could be used to mislead users or inject malicious content indirectly. Since the attack requires an administrator to be tricked, organizations with less security-aware staff are at higher risk. The vulnerability’s medium severity suggests it is not critical but should be addressed promptly to maintain website integrity and trustworthiness.
Mitigation Recommendations
To mitigate CVE-2026-1076, organizations should immediately update the Star Review Manager plugin to a version that includes nonce validation once available. Until a patch is released, administrators should implement strict access controls limiting who can access the plugin’s settings page and avoid clicking on suspicious links or emails. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin’s endpoints can reduce risk. Additionally, administrators should enable multi-factor authentication (MFA) on WordPress accounts to reduce the likelihood of account compromise. Regular security awareness training focusing on phishing and social engineering can help prevent the user interaction required for exploitation. Monitoring website appearance for unauthorized changes and maintaining regular backups will aid in rapid recovery if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-16T20:26:21.069Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974765f4623b1157ca739b2
Added to database: 1/24/2026, 7:35:59 AM
Last enriched: 1/31/2026, 8:59:59 AM
Last updated: 2/4/2026, 1:39:42 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.