Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3191: CWE-352 Cross-Site Request Forgery (CSRF) in teckel Minify HTML

0
Medium
VulnerabilityCVE-2026-3191cvecve-2026-3191cwe-352
Published: Tue Mar 31 2026 (03/31/2026, 11:18:56 UTC)
Source: CVE Database V5
Vendor/Project: teckel
Product: Minify HTML

Description

CVE-2026-3191 is a Cross-Site Request Forgery (CSRF) vulnerability in the teckel Minify HTML WordPress plugin versions up to 2. 1. 12. The flaw arises from missing or incorrect nonce validation in the 'minify_html_menu_options' function, allowing unauthenticated attackers to trick site administrators into submitting forged requests that update plugin settings. Exploitation requires user interaction, specifically the administrator clicking a malicious link. The vulnerability impacts the integrity and availability of the plugin's configuration but does not directly expose confidential data. The CVSS score is 5. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches once available or implement strict administrative access controls and user awareness to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 11:53:34 UTC

Technical Analysis

CVE-2026-3191 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the teckel Minify HTML plugin for WordPress, affecting all versions up to and including 2.1.12. The vulnerability stems from the absence or incorrect implementation of nonce validation in the 'minify_html_menu_options' function, which is responsible for handling plugin settings updates. Nonces are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce validation, attackers can craft malicious web requests that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), cause unauthorized changes to the plugin’s configuration. This can lead to altered minification behavior, potentially degrading website performance or causing availability issues. The attack vector is remote (network accessible), requires no privileges or authentication by the attacker, but does require user interaction from an administrator. The vulnerability impacts the integrity and availability of the plugin’s settings but does not directly compromise confidentiality. The CVSS v3.1 base score is 5.4, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L. No public exploits have been reported to date. The vulnerability was reserved in February 2026 and published in March 2026. Mitigation involves patching the plugin once updates are released or applying compensating controls such as restricting administrative access and educating administrators about phishing risks.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of the Minify HTML plugin’s settings by an attacker who tricks a site administrator into executing a malicious request. This can lead to degraded website performance, potential denial of service, or unintended behavior in HTML minification processes, affecting website availability and integrity. Although no direct data confidentiality breach occurs, the altered plugin behavior could indirectly affect user experience and trust. For organizations relying on WordPress sites with this plugin, especially those with high traffic or critical web services, this vulnerability could disrupt normal operations and require incident response efforts. The ease of exploitation (no authentication needed) combined with the requirement for administrator interaction makes targeted phishing or social engineering attacks the likely exploitation method. The absence of known exploits reduces immediate risk but does not eliminate it, especially as public proof-of-concept exploits may emerge. Organizations with multiple WordPress administrators or less stringent access controls are at higher risk.

Mitigation Recommendations

1. Monitor the teckel Minify HTML plugin repository and official channels for security patches addressing CVE-2026-3191 and apply updates promptly once available. 2. Until patches are released, restrict administrative access to trusted personnel only and enforce the principle of least privilege for WordPress admin accounts. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting plugin settings endpoints. 4. Educate WordPress administrators about phishing and social engineering risks, emphasizing caution when clicking links or submitting forms from untrusted sources. 5. Regularly audit plugin configurations and logs for unauthorized changes or anomalies. 6. Consider disabling or removing the Minify HTML plugin if it is not essential, or temporarily replacing it with alternative minification solutions that are not vulnerable. 7. Employ Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could facilitate CSRF attacks. 8. Use multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of compromised credentials facilitating exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-25T09:05:41.076Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbb22ae6bfc5ba1d0de95e

Added to database: 3/31/2026, 11:38:18 AM

Last enriched: 3/31/2026, 11:53:34 AM

Last updated: 3/31/2026, 12:46:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses