PT-2026-26848 · Xhanch Studio · Xhanch – My Advanced Settings

Published

2026-03-21

·

Updated

2026-03-21

·

CVE-2026-3332

CVSS v3.1

4.3

Medium

AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing nonce validation in the xms setting() function on the settings update handler. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Settings that can be modified include favicon URL, Google Analytics account ID, and various WordPress behavior toggles. The favicon url and ga acc id values are output on the front-end without escaping, enabling a CSRF to Stored XSS chain.

Fix

CSRF

Weakness Enumeration

Related Identifiers

CVE-2026-3332

Affected Products

Xhanch – My Advanced Settings