Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1455: CWE-352 Cross-Site Request Forgery (CSRF) in whatsiplus Whatsiplus Scheduled Notification for Woocommerce

0
Medium
VulnerabilityCVE-2026-1455cvecve-2026-1455cwe-352
Published: Thu Feb 19 2026 (02/19/2026, 04:36:25 UTC)
Source: CVE Database V5
Vendor/Project: whatsiplus
Product: Whatsiplus Scheduled Notification for Woocommerce

Description

The Whatsiplus Scheduled Notification for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the 'wsnfw_save_users_settings' AJAX action. This makes it possible for unauthenticated attackers to modify plugin configuration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:13:23 UTC

Technical Analysis

CVE-2026-1455 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Whatsiplus Scheduled Notification for Woocommerce plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability stems from the absence of nonce validation on the AJAX action 'wsnfw_save_users_settings', which is responsible for saving user settings within the plugin. Nonce validation is a security mechanism that ensures requests are legitimate and originate from authorized users. Without this protection, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), causes unauthorized modification of the plugin’s configuration settings. This can lead to altered notification schedules or other configuration changes that may disrupt business processes or open avenues for further exploitation. The vulnerability does not require authentication from the attacker but does require user interaction from an administrator, limiting the ease of exploitation. The CVSS v3.1 base score is 4.3 (medium), reflecting the lack of confidentiality or availability impact but acknowledging the integrity impact on plugin settings. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is used in WooCommerce environments, which are prevalent in e-commerce websites, making this a relevant threat for online retailers using WordPress with this plugin.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress and the Whatsiplus Scheduled Notification for Woocommerce plugin, this vulnerability poses a risk of unauthorized configuration changes. While it does not directly compromise sensitive data confidentiality or system availability, manipulation of notification settings could disrupt customer communications, order processing alerts, or marketing campaigns, potentially leading to operational inefficiencies and reputational damage. Additionally, altered configurations might be leveraged as a foothold for more sophisticated attacks if attackers can chain this vulnerability with others. Given the reliance on WooCommerce in many European online retail businesses, the impact could be significant in sectors where timely notifications are critical. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate the risk, especially in environments with less stringent user security awareness or where phishing attacks are prevalent.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for updates or patches from the Whatsiplus plugin developers and apply them immediately once available. In the absence of an official patch, administrators should restrict access to the WordPress admin panel to trusted personnel only and consider implementing multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Employing a Web Application Firewall (WAF) with rules to detect and block CSRF attempts targeting the AJAX action 'wsnfw_save_users_settings' can provide an additional protective layer. Administrators should be trained to recognize phishing attempts and avoid clicking on suspicious links. Reviewing and hardening WordPress security settings, including limiting plugin usage to trusted sources and regularly auditing plugin configurations, will also reduce exposure. Finally, consider disabling or removing the Whatsiplus Scheduled Notification plugin if it is not essential to business operations until a secure version is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-26T20:12:04.006Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f66aea4a407a3be115

Added to database: 2/19/2026, 4:56:22 AM

Last enriched: 2/19/2026, 5:13:23 AM

Last updated: 2/21/2026, 12:18:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats