Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1508: CWE-352 Cross-Site Request Forgery (CSRF) in Court Reservation

0
High
VulnerabilityCVE-2026-1508cvecve-2026-1508cwe-352
Published: Tue Mar 10 2026 (03/10/2026, 06:00:06 UTC)
Source: CVE Database V5
Product: Court Reservation

Description

CVE-2026-1508 is a Cross-Site Request Forgery (CSRF) vulnerability in the Court Reservation WordPress plugin versions before 1. 10. 9. The vulnerability arises because the plugin lacks proper CSRF protections when deleting events, allowing an attacker to trick an authenticated admin into unintentionally deleting events. Exploitation requires the victim to be logged in with administrative privileges and to interact with a maliciously crafted request. No known exploits are currently reported in the wild. This vulnerability impacts the integrity and availability of event data managed through the plugin. Organizations using this plugin without the patch are at risk of unauthorized event deletions, potentially disrupting scheduling and operations. Mitigation involves updating the plugin to a fixed version once available or implementing additional CSRF protections such as nonce verification. Countries with significant WordPress usage and where this plugin is popular are most at risk, including the United States, United Kingdom, Canada, Australia, Germany, and others.

AI-Powered Analysis

AILast updated: 03/10/2026, 06:48:34 UTC

Technical Analysis

CVE-2026-1508 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Court Reservation WordPress plugin prior to version 1.10.9. The vulnerability stems from the absence of CSRF token validation when processing event deletion requests. CSRF attacks exploit the trust a web application places in a logged-in user by tricking them into submitting unauthorized requests. In this case, an attacker can craft a malicious web page or email that, when visited or clicked by an authenticated administrator, triggers the deletion of events without their explicit consent. Since the plugin does not verify the origin or authenticity of the deletion request, it is vulnerable to such attacks. The impact is confined to users with administrative privileges, as only they can delete events. The vulnerability affects the integrity and availability of event data, potentially causing operational disruptions. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVE identifier. The lack of a CVSS score suggests the need for an expert severity assessment. The vulnerability is categorized under CWE-352, which covers CSRF issues. The plugin is used in WordPress environments for managing court or event reservations, making it relevant to organizations relying on this plugin for scheduling. The absence of a patch link indicates that a fix may be pending or not yet publicly released. The vulnerability was reserved in January 2026 and published in March 2026, indicating recent discovery.

Potential Impact

The primary impact of CVE-2026-1508 is on the integrity and availability of event data managed by the Court Reservation plugin. An attacker exploiting this vulnerability can cause unauthorized deletion of events, leading to potential operational disruptions, scheduling conflicts, and loss of critical reservation data. For organizations relying heavily on this plugin for managing court or event bookings, such disruptions could affect customer trust, service continuity, and administrative workflows. Since exploitation requires an authenticated administrator, the scope is limited to environments where administrative accounts are compromised or tricked into visiting malicious content. However, the ease of exploitation through social engineering makes this a significant risk. There is no direct impact on confidentiality, but the loss or manipulation of event data can have downstream effects on business operations. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly known. Organizations with multiple administrators or high turnover may be more vulnerable due to increased chances of social engineering success.

Mitigation Recommendations

To mitigate CVE-2026-1508, organizations should prioritize updating the Court Reservation plugin to version 1.10.9 or later once it becomes available, as this version is expected to include proper CSRF protections. Until an official patch is released, administrators should implement additional security controls such as: 1) Restricting administrative access to trusted users only and enforcing strong authentication mechanisms like multi-factor authentication (MFA) to reduce the risk of compromised accounts. 2) Educating administrators about the risks of CSRF and social engineering attacks, emphasizing caution when clicking on links or visiting untrusted websites while logged into the WordPress admin panel. 3) Employing web application firewalls (WAFs) that can detect and block suspicious CSRF attack patterns or unauthorized POST requests targeting event deletion endpoints. 4) Implementing custom nonce or token verification in the plugin code if feasible, to validate the authenticity of deletion requests. 5) Regularly auditing administrative actions and event logs to detect any unauthorized deletions promptly. 6) Limiting the number of administrators with deletion privileges to minimize potential attack surface. These measures collectively reduce the likelihood and impact of exploitation until the official fix is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-27T20:42:36.100Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69afbb66ea502d3aa81236ae

Added to database: 3/10/2026, 6:34:14 AM

Last enriched: 3/10/2026, 6:48:34 AM

Last updated: 3/10/2026, 8:43:16 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses