PT-2026-26848 · Xhanch Studio · Xhanch – My Advanced Settings
Published
2026-03-21
·
Updated
2026-03-21
·
CVE-2026-3332
CVSS v3.1
4.3
Medium
| AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing nonce validation in the
xms setting() function on the settings update handler. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Settings that can be modified include favicon URL, Google Analytics account ID, and various WordPress behavior toggles. The favicon url and ga acc id values are output on the front-end without escaping, enabling a CSRF to Stored XSS chain.Fix
CSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Xhanch – My Advanced Settings