Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1983: CWE-352 Cross-Site Request Forgery (CSRF) in sourcez SEATT: Simple Event Attendance

0
Medium
VulnerabilityCVE-2026-1983cvecve-2026-1983cwe-352
Published: Sat Feb 14 2026 (02/14/2026, 04:35:42 UTC)
Source: CVE Database V5
Vendor/Project: sourcez
Product: SEATT: Simple Event Attendance

Description

The SEATT: Simple Event Attendance plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.0. This is due to missing nonce validation on the event deletion functionality. This makes it possible for unauthenticated attackers to delete arbitrary events via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/14/2026, 05:04:05 UTC

Technical Analysis

CVE-2026-1983 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the SEATT: Simple Event Attendance plugin for WordPress, affecting all versions up to and including 1.5.0. The vulnerability stems from the absence of nonce validation on the event deletion functionality, which is a security mechanism designed to ensure that requests are intentional and originate from legitimate users. Without this protection, an attacker can craft a malicious request that, if executed by an administrator (e.g., by clicking a link or visiting a malicious webpage), will delete arbitrary events from the system. This attack does not require the attacker to be authenticated or have any privileges; the critical factor is the ability to trick an administrator into performing the action. The vulnerability impacts the integrity of event data but does not affect confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-352, which covers CSRF issues. This type of vulnerability is common in web applications that fail to implement proper anti-CSRF tokens or nonce validation on sensitive state-changing operations.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of event-related data managed through the SEATT plugin. Unauthorized deletion of events could disrupt business operations, event planning, and attendance tracking, potentially causing reputational damage and operational inefficiencies. Organizations relying heavily on event management for customer engagement, internal coordination, or compliance reporting may face increased risks. Although the vulnerability does not compromise confidentiality or availability, the loss or manipulation of event data could lead to misinformation, scheduling conflicts, or loss of critical event history. In sectors such as education, government, and large enterprises where event attendance records are important, this could have downstream effects on decision-making and audit trails. The requirement for administrator interaction means that social engineering or phishing campaigns could be used to exploit this vulnerability, increasing the risk in environments with less security awareness or training.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the SEATT plugin to a version that includes nonce validation on the event deletion functionality once available. In the absence of an official patch, administrators can implement custom nonce checks in the plugin code to validate requests before processing event deletions. Additionally, organizations should educate administrators about the risks of clicking untrusted links and implement security awareness training focused on phishing and social engineering. Employing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide an additional layer of defense. Restricting administrative access to trusted networks or VPNs and enforcing multi-factor authentication (MFA) for WordPress admin accounts can reduce the likelihood of successful exploitation. Regular backups of event data should be maintained to enable recovery in case of unauthorized deletions. Monitoring logs for unusual deletion requests or patterns can help detect attempted exploitation early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T14:45:19.212Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ffec8c9e1ff5ad85c7206

Added to database: 2/14/2026, 4:49:12 AM

Last enriched: 2/14/2026, 5:04:05 AM

Last updated: 2/21/2026, 12:18:03 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats