CVE-2026-2023: CWE-352 Cross-Site Request Forgery (CSRF) in brikou WP Plugin Info Card
The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The WP Plugin Info Card plugin for WordPress, widely used to display plugin information cards, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-2023. This vulnerability exists in all versions up to and including 6.2.0 due to the deliberate disabling of nonce validation in the ajax_save_custom_plugin() function by prefixing the check with 'false &&', effectively bypassing the security mechanism designed to prevent CSRF attacks. Nonce validation is a critical security control in WordPress to ensure that requests to modify data originate from legitimate users and not from forged requests. Because this validation is missing, an attacker can craft a malicious web page or link that, when visited or clicked by an authenticated site administrator, triggers unauthorized creation or modification of custom plugin entries. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making social engineering a key component of exploitation. The vulnerability impacts the integrity of plugin data but does not affect confidentiality or availability. The CVSS v3.1 score is 4.3 (medium severity), reflecting the ease of exploitation without authentication but requiring user interaction and limited impact scope. No public exploits are known at this time, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple administrators or high-value configurations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modifications of WordPress plugin data, potentially undermining the trustworthiness and functionality of websites. While it does not directly compromise sensitive data confidentiality or cause denial of service, altering plugin entries could be leveraged as a foothold for further attacks, including injecting malicious code or misleading site visitors. Organizations relying on WordPress for customer-facing websites, e-commerce, or internal portals may face reputational damage or operational disruptions if attackers exploit this flaw. The requirement for administrator interaction means that phishing or social engineering campaigns targeting European IT staff could increase. Given the widespread use of WordPress across Europe, especially in countries with large digital economies and extensive SME sectors, the risk is non-trivial. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.
Mitigation Recommendations
Organizations should monitor for and apply security patches from the plugin vendor as soon as they become available. In the absence of an official patch, administrators can mitigate risk by disabling or restricting access to the ajax_save_custom_plugin() functionality, for example by implementing custom nonce checks or limiting AJAX endpoint access to trusted users only. Deploying a Web Application Firewall (WAF) with CSRF protection rules can help detect and block suspicious requests. Educating administrators about the risks of clicking unknown links and implementing multi-factor authentication (MFA) for WordPress admin accounts can reduce the likelihood of successful social engineering. Regular audits of plugin configurations and logs may help detect unauthorized changes early. Finally, organizations should consider limiting the number of users with administrative privileges to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-2023: CWE-352 Cross-Site Request Forgery (CSRF) in brikou WP Plugin Info Card
Description
The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
The WP Plugin Info Card plugin for WordPress, widely used to display plugin information cards, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-2023. This vulnerability exists in all versions up to and including 6.2.0 due to the deliberate disabling of nonce validation in the ajax_save_custom_plugin() function by prefixing the check with 'false &&', effectively bypassing the security mechanism designed to prevent CSRF attacks. Nonce validation is a critical security control in WordPress to ensure that requests to modify data originate from legitimate users and not from forged requests. Because this validation is missing, an attacker can craft a malicious web page or link that, when visited or clicked by an authenticated site administrator, triggers unauthorized creation or modification of custom plugin entries. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making social engineering a key component of exploitation. The vulnerability impacts the integrity of plugin data but does not affect confidentiality or availability. The CVSS v3.1 score is 4.3 (medium severity), reflecting the ease of exploitation without authentication but requiring user interaction and limited impact scope. No public exploits are known at this time, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple administrators or high-value configurations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modifications of WordPress plugin data, potentially undermining the trustworthiness and functionality of websites. While it does not directly compromise sensitive data confidentiality or cause denial of service, altering plugin entries could be leveraged as a foothold for further attacks, including injecting malicious code or misleading site visitors. Organizations relying on WordPress for customer-facing websites, e-commerce, or internal portals may face reputational damage or operational disruptions if attackers exploit this flaw. The requirement for administrator interaction means that phishing or social engineering campaigns targeting European IT staff could increase. Given the widespread use of WordPress across Europe, especially in countries with large digital economies and extensive SME sectors, the risk is non-trivial. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.
Mitigation Recommendations
Organizations should monitor for and apply security patches from the plugin vendor as soon as they become available. In the absence of an official patch, administrators can mitigate risk by disabling or restricting access to the ajax_save_custom_plugin() functionality, for example by implementing custom nonce checks or limiting AJAX endpoint access to trusted users only. Deploying a Web Application Firewall (WAF) with CSRF protection rules can help detect and block suspicious requests. Educating administrators about the risks of clicking unknown links and implementing multi-factor authentication (MFA) for WordPress admin accounts can reduce the likelihood of successful social engineering. Regular audits of plugin configurations and logs may help detect unauthorized changes early. Finally, organizations should consider limiting the number of users with administrative privileges to reduce exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-05T20:40:19.430Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995557f80d747be2043e61e
Added to database: 2/18/2026, 6:00:31 AM
Last enriched: 2/18/2026, 6:15:00 AM
Last updated: 2/20/2026, 11:23:33 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumCVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
MediumCVE-2026-27024: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.