Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2023: CWE-352 Cross-Site Request Forgery (CSRF) in brikou WP Plugin Info Card

0
Medium
VulnerabilityCVE-2026-2023cvecve-2026-2023cwe-352
Published: Wed Feb 18 2026 (02/18/2026, 05:29:15 UTC)
Source: CVE Database V5
Vendor/Project: brikou
Product: WP Plugin Info Card

Description

The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/18/2026, 06:15:00 UTC

Technical Analysis

The WP Plugin Info Card plugin for WordPress, widely used to display plugin information cards, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-2023. This vulnerability exists in all versions up to and including 6.2.0 due to the deliberate disabling of nonce validation in the ajax_save_custom_plugin() function by prefixing the check with 'false &&', effectively bypassing the security mechanism designed to prevent CSRF attacks. Nonce validation is a critical security control in WordPress to ensure that requests to modify data originate from legitimate users and not from forged requests. Because this validation is missing, an attacker can craft a malicious web page or link that, when visited or clicked by an authenticated site administrator, triggers unauthorized creation or modification of custom plugin entries. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making social engineering a key component of exploitation. The vulnerability impacts the integrity of plugin data but does not affect confidentiality or availability. The CVSS v3.1 score is 4.3 (medium severity), reflecting the ease of exploitation without authentication but requiring user interaction and limited impact scope. No public exploits are known at this time, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple administrators or high-value configurations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modifications of WordPress plugin data, potentially undermining the trustworthiness and functionality of websites. While it does not directly compromise sensitive data confidentiality or cause denial of service, altering plugin entries could be leveraged as a foothold for further attacks, including injecting malicious code or misleading site visitors. Organizations relying on WordPress for customer-facing websites, e-commerce, or internal portals may face reputational damage or operational disruptions if attackers exploit this flaw. The requirement for administrator interaction means that phishing or social engineering campaigns targeting European IT staff could increase. Given the widespread use of WordPress across Europe, especially in countries with large digital economies and extensive SME sectors, the risk is non-trivial. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

Organizations should monitor for and apply security patches from the plugin vendor as soon as they become available. In the absence of an official patch, administrators can mitigate risk by disabling or restricting access to the ajax_save_custom_plugin() functionality, for example by implementing custom nonce checks or limiting AJAX endpoint access to trusted users only. Deploying a Web Application Firewall (WAF) with CSRF protection rules can help detect and block suspicious requests. Educating administrators about the risks of clicking unknown links and implementing multi-factor authentication (MFA) for WordPress admin accounts can reduce the likelihood of successful social engineering. Regular audits of plugin configurations and logs may help detect unauthorized changes early. Finally, organizations should consider limiting the number of users with administrative privileges to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T20:40:19.430Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995557f80d747be2043e61e

Added to database: 2/18/2026, 6:00:31 AM

Last enriched: 2/18/2026, 6:15:00 AM

Last updated: 2/20/2026, 11:23:33 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats