PT-2026-39973 · Saturngod · Zawgyi Embed
Muhammad Afnaan
·
Published
2026-05-12
·
Updated
2026-05-12
·
CVE-2026-7616
CVSS v3.1
4.3
Medium
| Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
The Zawgyi Embed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing or incorrect nonce validation on the zawgyi adminpage function. This makes it possible for unauthenticated attackers to update the plugin's zawgyi forceCSS setting by submitting a forged POST request to options-general.php?page=zawgyi embed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Fix
CSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Zawgyi Embed