CVE-2026-4068: CWE-352 Cross-Site Request Forgery (CSRF) in pattihis Add Custom Fields to Media
CVE-2026-4068 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Add Custom Fields to Media' by pattihis, affecting all versions up to 2. 0. 3. The flaw arises because the plugin fails to validate a nonce token when processing deletion of custom media fields, allowing unauthenticated attackers to trick administrators into deleting arbitrary fields via crafted links. While the 'add field' operation is protected by nonce validation, the 'delete field' operation processes the $_GET['delete'] parameter without such protection. Exploitation requires user interaction, specifically an admin clicking a malicious link, but no authentication is needed to initiate the request. The vulnerability impacts the integrity of custom media fields but does not affect confidentiality or availability. No known exploits are reported in the wild yet. Organizations using this plugin should apply patches or implement nonce validation immediately to prevent unauthorized modifications to media metadata.
AI Analysis
Technical Summary
The 'Add Custom Fields to Media' WordPress plugin by pattihis contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-4068, affecting all versions up to and including 2.0.3. The vulnerability stems from the plugin's failure to implement nonce validation on the deletion functionality of custom media fields within the admin interface. Specifically, while the 'add field' operation correctly validates a nonce token to ensure the legitimacy of the request, the 'delete field' operation processes the $_GET['delete'] parameter without any nonce verification. This omission allows an attacker to craft a malicious URL that, when visited by an authenticated administrator, triggers the deletion of arbitrary custom media fields by calling update_option() without proper authorization checks. The attack vector requires social engineering to convince an admin to click a malicious link, but no prior authentication or elevated privileges are needed by the attacker to initiate the request. The vulnerability impacts the integrity of the media metadata stored via custom fields, potentially disrupting site functionality or content management workflows. Although no exploits have been reported in the wild, the vulnerability has a CVSS 3.1 base score of 4.3, reflecting its medium severity due to the need for user interaction and limited impact scope. The flaw is categorized under CWE-352, which covers CSRF vulnerabilities that exploit missing or improper request validation mechanisms. The plugin's widespread use in WordPress sites that manage media with custom fields makes this a relevant concern for site administrators and security teams.
Potential Impact
The primary impact of CVE-2026-4068 is on the integrity of WordPress sites using the vulnerable 'Add Custom Fields to Media' plugin. Attackers can delete arbitrary custom media fields by exploiting the CSRF flaw, potentially leading to loss or corruption of metadata associated with media files. This can disrupt content management, cause display issues, or break functionality relying on these custom fields. Since the attack requires an administrator to click a malicious link, the risk depends on the likelihood of successful social engineering. Confidentiality and availability are not directly affected by this vulnerability. However, the integrity compromise could have downstream effects on site operations and user trust. Organizations with high reliance on media metadata customization, such as media companies, e-commerce sites with rich media catalogs, or content-heavy platforms, may experience operational disruptions. The absence of known exploits reduces immediate risk, but the vulnerability remains a viable attack vector until patched.
Mitigation Recommendations
To mitigate CVE-2026-4068, site administrators should immediately update the 'Add Custom Fields to Media' plugin to a version that includes nonce validation on the delete operation once available. In the absence of an official patch, administrators can manually implement nonce checks in the plugin's admin display template for the delete field functionality, ensuring that any request to delete a field includes a valid nonce token verified server-side before processing. Additionally, administrators should educate users with admin privileges about the risks of clicking untrusted links and consider implementing Content Security Policy (CSP) headers to reduce the risk of CSRF attacks. Employing security plugins that provide CSRF protection or web application firewalls (WAFs) capable of detecting and blocking suspicious requests can add further defense layers. Regular backups of site data, including media metadata, are essential to recover from any unauthorized changes. Finally, monitoring admin activity logs for unusual deletion events can help detect exploitation attempts early.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-4068: CWE-352 Cross-Site Request Forgery (CSRF) in pattihis Add Custom Fields to Media
Description
CVE-2026-4068 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Add Custom Fields to Media' by pattihis, affecting all versions up to 2. 0. 3. The flaw arises because the plugin fails to validate a nonce token when processing deletion of custom media fields, allowing unauthenticated attackers to trick administrators into deleting arbitrary fields via crafted links. While the 'add field' operation is protected by nonce validation, the 'delete field' operation processes the $_GET['delete'] parameter without such protection. Exploitation requires user interaction, specifically an admin clicking a malicious link, but no authentication is needed to initiate the request. The vulnerability impacts the integrity of custom media fields but does not affect confidentiality or availability. No known exploits are reported in the wild yet. Organizations using this plugin should apply patches or implement nonce validation immediately to prevent unauthorized modifications to media metadata.
AI-Powered Analysis
Technical Analysis
The 'Add Custom Fields to Media' WordPress plugin by pattihis contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-4068, affecting all versions up to and including 2.0.3. The vulnerability stems from the plugin's failure to implement nonce validation on the deletion functionality of custom media fields within the admin interface. Specifically, while the 'add field' operation correctly validates a nonce token to ensure the legitimacy of the request, the 'delete field' operation processes the $_GET['delete'] parameter without any nonce verification. This omission allows an attacker to craft a malicious URL that, when visited by an authenticated administrator, triggers the deletion of arbitrary custom media fields by calling update_option() without proper authorization checks. The attack vector requires social engineering to convince an admin to click a malicious link, but no prior authentication or elevated privileges are needed by the attacker to initiate the request. The vulnerability impacts the integrity of the media metadata stored via custom fields, potentially disrupting site functionality or content management workflows. Although no exploits have been reported in the wild, the vulnerability has a CVSS 3.1 base score of 4.3, reflecting its medium severity due to the need for user interaction and limited impact scope. The flaw is categorized under CWE-352, which covers CSRF vulnerabilities that exploit missing or improper request validation mechanisms. The plugin's widespread use in WordPress sites that manage media with custom fields makes this a relevant concern for site administrators and security teams.
Potential Impact
The primary impact of CVE-2026-4068 is on the integrity of WordPress sites using the vulnerable 'Add Custom Fields to Media' plugin. Attackers can delete arbitrary custom media fields by exploiting the CSRF flaw, potentially leading to loss or corruption of metadata associated with media files. This can disrupt content management, cause display issues, or break functionality relying on these custom fields. Since the attack requires an administrator to click a malicious link, the risk depends on the likelihood of successful social engineering. Confidentiality and availability are not directly affected by this vulnerability. However, the integrity compromise could have downstream effects on site operations and user trust. Organizations with high reliance on media metadata customization, such as media companies, e-commerce sites with rich media catalogs, or content-heavy platforms, may experience operational disruptions. The absence of known exploits reduces immediate risk, but the vulnerability remains a viable attack vector until patched.
Mitigation Recommendations
To mitigate CVE-2026-4068, site administrators should immediately update the 'Add Custom Fields to Media' plugin to a version that includes nonce validation on the delete operation once available. In the absence of an official patch, administrators can manually implement nonce checks in the plugin's admin display template for the delete field functionality, ensuring that any request to delete a field includes a valid nonce token verified server-side before processing. Additionally, administrators should educate users with admin privileges about the risks of clicking untrusted links and consider implementing Content Security Policy (CSP) headers to reduce the risk of CSRF attacks. Employing security plugins that provide CSRF protection or web application firewalls (WAFs) capable of detecting and blocking suspicious requests can add further defense layers. Regular backups of site data, including media metadata, are essential to recover from any unauthorized changes. Finally, monitoring admin activity logs for unusual deletion events can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-12T19:38:07.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bba122e32a4fbe5f9bab7f
Added to database: 3/19/2026, 7:09:22 AM
Last enriched: 3/19/2026, 7:24:11 AM
Last updated: 3/19/2026, 8:10:02 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.