PT-2026-34296 · Chsxf · Mcatfilter

Muhammad Afnaan

·

Published

2026-04-22

·

Updated

2026-04-22

·

CVE-2026-4139

CVSS v3.1

4.3

Medium

AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
The mCatFilter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.5.2. This is due to the complete absence of nonce verification and capability checks in the compute post() function, which processes settings updates. The compute post() function is called in the plugin constructor on every page load via the plugins loaded hook, and it directly processes $ POST data to modify plugin settings via update option() without any CSRF token validation. This makes it possible for unauthenticated attackers to modify all plugin settings, including category exclusion rules, feed exclusion flags, and tag page exclusion flags, via a forged POST request, granted they can trick a site administrator into performing an action such as clicking a link.

Fix

CSRF

Weakness Enumeration

Related Identifiers

CVE-2026-4139

Affected Products

Mcatfilter