Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1785: CWE-352 Cross-Site Request Forgery (CSRF) in codesnippetspro Code Snippets

0
Medium
VulnerabilityCVE-2026-1785cvecve-2026-1785cwe-352
Published: Fri Feb 06 2026 (02/06/2026, 08:25:26 UTC)
Source: CVE Database V5
Vendor/Project: codesnippetspro
Product: Code Snippets

Description

The Code Snippets plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.9.4. This is due to missing nonce validation on the cloud snippet download and update actions in the Cloud_Search_List_Table class. This makes it possible for unauthenticated attackers to force logged-in administrators to download or update cloud snippets without their consent via a crafted request, granted they can trick an administrator into visiting a malicious page.

AI-Powered Analysis

AILast updated: 02/06/2026, 09:02:30 UTC

Technical Analysis

CVE-2026-1785 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Code Snippets plugin for WordPress, affecting all versions up to and including 3.9.4. The root cause is the absence of nonce validation on critical actions related to cloud snippet downloads and updates within the Cloud_Search_List_Table class. Nonce tokens are security measures designed to ensure that requests to perform sensitive actions originate from legitimate users and not from malicious third-party sites. Without this validation, an attacker can craft a malicious webpage that, when visited by a logged-in WordPress administrator, triggers unauthorized snippet downloads or updates without their consent. This attack vector requires the victim to be authenticated as an administrator and to visit a malicious site, but does not require the attacker to have any privileges or prior authentication. The impact primarily affects the integrity of the WordPress environment by allowing unauthorized code changes, which could lead to further compromise if malicious snippets are introduced. Confidentiality and availability are not directly impacted by this vulnerability. The CVSS v3.1 score is 4.3 (medium), reflecting the need for user interaction and the limited scope of impact. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed proactively.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of WordPress sites using the Code Snippets plugin, particularly those with administrators who frequently access the backend interface. Unauthorized snippet updates could introduce malicious code, potentially leading to website defacement, data manipulation, or a foothold for further attacks such as privilege escalation or data exfiltration. While the vulnerability does not directly compromise confidentiality or availability, the integrity breach can have cascading effects on trustworthiness and operational security. Organizations relying on WordPress for critical web services or e-commerce could face reputational damage and operational disruption if exploited. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially spear-phishing or social engineering campaigns aimed at administrators. Given the widespread use of WordPress in Europe, the threat is significant for sectors such as government, finance, and media where website integrity is paramount.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately restrict administrator access to trusted networks and devices to reduce exposure to malicious sites. 2) Educate administrators about the risks of visiting untrusted websites while logged into WordPress admin interfaces. 3) Implement web application firewalls (WAFs) with CSRF protection rules to detect and block suspicious requests targeting the Code Snippets plugin endpoints. 4) Monitor WordPress logs for unusual snippet download or update activities, especially those initiated without administrator action. 5) Disable or remove the Code Snippets plugin if it is not essential to reduce attack surface. 6) Follow vendor communications closely for official patches or updates and apply them promptly once available. 7) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 8) Use multi-factor authentication (MFA) for administrator accounts to reduce the risk of session hijacking that could facilitate exploitation. These measures collectively reduce the risk of successful CSRF exploitation and help maintain site integrity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-02T21:18:03.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6985aa16f9fa50a62fee1480

Added to database: 2/6/2026, 8:45:10 AM

Last enriched: 2/6/2026, 9:02:30 AM

Last updated: 2/7/2026, 2:26:31 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats