<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WP Editor Plugin &lt;= 1.2.9.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/wp-editor-plugin--1.2.9.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/wp-editor-plugin--1.2.9.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item></channel></rss>