Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1208: CWE-352 Cross-Site Request Forgery (CSRF) in mainichiweb Friendly Functions for Welcart

0
Medium
VulnerabilityCVE-2026-1208cvecve-2026-1208cwe-352
Published: Sat Jan 24 2026 (01/24/2026, 09:08:07 UTC)
Source: CVE Database V5
Vendor/Project: mainichiweb
Product: Friendly Functions for Welcart

Description

CVE-2026-1208 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Friendly Functions for Welcart WordPress plugin up to version 1. 2. 5. The flaw arises from missing or incorrect nonce validation on the plugin's settings page, allowing unauthenticated attackers to trick site administrators into executing unauthorized changes by clicking a malicious link. Although exploitation requires user interaction and does not impact confidentiality or availability, it can lead to unauthorized modification of plugin settings, potentially weakening site security or functionality. The vulnerability has a CVSS score of 4. 3 (medium severity) and no known exploits in the wild. European organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized configuration changes. Countries with higher WordPress adoption and e-commerce activity, such as Germany, the UK, and France, are more likely to be affected. Mitigation involves applying updates when available, implementing additional CSRF protections, and educating administrators about phishing risks.

AI-Powered Analysis

AILast updated: 01/24/2026, 09:35:27 UTC

Technical Analysis

CVE-2026-1208 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Friendly Functions for Welcart plugin for WordPress, affecting all versions up to and including 1.2.5. The vulnerability stems from missing or incorrect nonce validation on the plugin's settings page, which is intended to protect against unauthorized requests. Nonces are security tokens used in WordPress to verify that requests originate from legitimate users and not from malicious third parties. Due to this flaw, an attacker can craft a malicious web page or email containing a specially designed request that, when clicked by an authenticated site administrator, causes the plugin settings to be modified without their consent. This attack does not require the attacker to be authenticated and does not compromise confidentiality or availability directly but can lead to integrity issues by altering plugin configurations. The vulnerability requires user interaction (clicking a link) and affects the integrity of the plugin's settings. The CVSS 3.1 score is 4.3, reflecting a medium severity level, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. No known exploits have been reported in the wild as of the publication date. The vulnerability was assigned by Wordfence and published on January 24, 2026. The plugin is used primarily in WordPress environments that utilize the Welcart e-commerce system, which is popular in certain markets for online store management.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of their WordPress-based e-commerce sites using the Friendly Functions for Welcart plugin. Unauthorized changes to plugin settings could lead to misconfigurations that degrade site functionality, weaken security controls, or disrupt business operations. While it does not directly expose sensitive data or cause denial of service, altered settings might enable further exploitation or reduce trustworthiness of the site. Given the widespread use of WordPress and e-commerce platforms in Europe, especially in countries with strong digital economies such as Germany, the UK, France, and the Netherlands, affected organizations could face operational disruptions or reputational damage if attackers leverage this vulnerability. The requirement for user interaction limits large-scale automated exploitation but targeted phishing campaigns against site administrators could be effective. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Monitor the plugin vendor's updates and apply patches promptly once released to fix the nonce validation issue. 2) Until patches are available, implement additional CSRF protections at the web application firewall (WAF) or reverse proxy level to detect and block suspicious requests targeting the plugin's settings page. 3) Restrict administrative access to the WordPress backend using IP whitelisting or VPNs to reduce exposure. 4) Educate site administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 5) Regularly audit plugin configurations and logs for unauthorized changes to detect potential exploitation early. 6) Consider disabling or replacing the plugin if it is not essential or if no timely patch is forthcoming. 7) Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of account compromise that could facilitate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-19T20:41:46.581Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69748ef84623b1157cac2e84

Added to database: 1/24/2026, 9:20:56 AM

Last enriched: 1/24/2026, 9:35:27 AM

Last updated: 1/24/2026, 12:05:06 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats