<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Csrf — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/csrf/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/csrf/feed.xml" rel="self" type="application/rss+xml"/><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item><item><title>OpenClaw Cross-Site Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-csrf/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-csrf/</guid><description>OpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 is susceptible to Cross-Site Request Forgery (CSRF) attacks. The vulnerability lies in the lack of browser-origin validation within the HTTP operator endpoints when the application operates in trusted-proxy mode. This allows an attacker to craft malicious HTTP requests originating from a user&rsquo;s browser to perform unauthorized actions within the OpenClaw application. Successful exploitation of this vulnerability enables attackers to execute privileged operations, potentially leading to data modification or unauthorized access to sensitive functionalities. This vulnerability requires the application to be deployed in trusted-proxy mode to be exploitable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious HTML page containing a forged HTTP request targeting a vulnerable OpenClaw HTTP operator endpoint.</li>
<li>The attacker hosts the malicious HTML page on a website or delivers it through phishing.</li>
<li>A victim user, authenticated to the OpenClaw application, visits the malicious HTML page in their browser.</li>
<li>The victim&rsquo;s browser automatically sends the forged HTTP request to the vulnerable OpenClaw endpoint.</li>
<li>Because the OpenClaw application lacks proper browser-origin validation, it processes the forged request.</li>
<li>The attacker is able to perform unauthorized actions as the authenticated user.</li>
<li>The attacker can modify user configurations or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability in OpenClaw can lead to unauthorized modification of application settings, data manipulation, or even complete account takeover. While specific victim numbers are unavailable, the impact extends to any organization utilizing OpenClaw in a trusted-proxy deployment scenario. The vulnerability can potentially compromise data integrity and confidentiality, leading to significant operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41347.</li>
<li>Deploy the Sigma rule below to detect suspicious HTTP requests lacking proper origin validation within your web server logs.</li>
<li>Implement proper CSRF protection mechanisms, such as synchronizer tokens, in OpenClaw&rsquo;s HTTP operator endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>csrf</category><category>web-application</category><category>vulnerability</category></item><item><title>Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)</title><link>https://feed.craftedsignal.io/briefs/2026-04-woocommerce-csrf/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-woocommerce-csrf/</guid><description>The Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.</description><content:encoded><![CDATA[<p>The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin, a WordPress plugin, suffers from a Cross-Site Request Forgery (CSRF) vulnerability. Present in versions 13.4.6 through 13.5.2.1, this flaw allows unauthenticated attackers to execute administrative functions if they can successfully coerce a site administrator into performing an action, such as clicking a specially crafted link. The vulnerability stems from the plugin&rsquo;s failure to implement proper nonce validation on several AJAX actions, including <code>ajax_migrate_to_custom_post_type</code>, <code>ajax_adt_clear_custom_attributes_product_meta_keys</code>, <code>ajax_update_file_url_to_lower_case</code>, <code>ajax_use_legacy_filters_and_rules</code>, and <code>ajax_fix_duplicate_feed</code>. This vulnerability poses a significant risk to WooCommerce store owners using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL containing a request to one of the vulnerable AJAX actions (e.g., <code>ajax_migrate_to_custom_post_type</code>).</li>
<li>The attacker distributes the malicious URL via email, social media, or another channel, attempting to trick a WordPress administrator into clicking the link.</li>
<li>The administrator, while authenticated to the WordPress admin panel, clicks the malicious link.</li>
<li>The administrator&rsquo;s browser sends the forged request to the WordPress server, including the administrator&rsquo;s session cookies.</li>
<li>Due to the missing or incorrect nonce validation, the WordPress server processes the request as if it were a legitimate action performed by the administrator.</li>
<li>Depending on the specific AJAX action targeted, the attacker can trigger feed migration, clear custom attribute caches, rewrite feed file URLs to lowercase, toggle legacy filter and rule settings, or delete duplicate feed posts.</li>
<li>The attacker repeats this process to perform other administrative actions, gaining control over the plugin&rsquo;s settings and data.</li>
<li>The attacker potentially manipulates product feeds to inject malicious content, redirect users, or compromise the WooCommerce store&rsquo;s SEO.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability (CVE-2026-3499) could allow an attacker to manipulate a WooCommerce store&rsquo;s product feeds, potentially leading to data corruption, SEO poisoning, or the injection of malicious content. If successful, attackers could modify product information, redirect users to phishing sites, or damage the store&rsquo;s reputation. The severity of the impact depends on the targeted AJAX action, but the potential for unauthorized administrative control is significant. Given the wide usage of WooCommerce and the Product Feed PRO plugin, a large number of online stores are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Product Feed PRO for WooCommerce plugin to a patched version greater than 13.5.2.1 to remediate CVE-2026-3499.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect exploitation attempts targeting the vulnerable AJAX actions.</li>
<li>Implement web application firewall (WAF) rules to block requests to the vulnerable AJAX endpoints originating from suspicious referrers.</li>
<li>Educate WordPress administrators on the risks of CSRF attacks and the importance of verifying links before clicking them.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>woocommerce</category><category>csrf</category><category>cve-2026-3499</category></item><item><title>CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-csrf/</link><pubDate>Tue, 07 Apr 2026 09:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-csrf/</guid><description>A cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.</description><content:encoded><![CDATA[<p>A cross-site request forgery (CSRF) vulnerability, identified as CVE-2026-34896, affects the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin. This vulnerability allows an attacker to trick a user into performing actions they did not intend to, such as modifying plugin settings or performing administrative tasks, provided the targeted user is authenticated to the WordPress site. The vulnerability exists in versions from n/a through 2.1.1. The vulnerability was reported to affect a publicly available plugin, increasing the scope of potentially impacted websites. Successful exploitation could lead to arbitrary code execution depending on the privileges of the targeted user and plugin functionality that can be abused.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable WordPress site running the affected plugin.</li>
<li>The attacker crafts a malicious HTML page containing a CSRF exploit. This page contains a crafted HTTP request designed to trigger a specific action within the plugin (e.g., changing settings) when submitted by an authenticated user.</li>
<li>The attacker distributes the malicious HTML page via email, social media, or other means to a targeted WordPress administrator or user.</li>
<li>The targeted user, while logged into the vulnerable WordPress site, visits the malicious HTML page.</li>
<li>The user&rsquo;s browser automatically submits the crafted HTTP request to the WordPress site without the user&rsquo;s knowledge or consent.</li>
<li>The WordPress site, believing the request originated from the authenticated user, processes the request and executes the attacker&rsquo;s desired action.</li>
<li>The attacker&rsquo;s malicious action, such as changing plugin settings, is successfully performed on the vulnerable WordPress site.</li>
<li>Depending on the privileges of the compromised user and vulnerable plugin settings, the attacker may be able to achieve arbitrary code execution, site defacement, or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability (CVE-2026-34896) in the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin could lead to unauthorized modification of website settings, potentially resulting in site defacement, malware injection, or complete website takeover. The impact depends on the targeted user&rsquo;s privileges and the plugin&rsquo;s configurable options. While the exact number of affected websites is unknown, the plugin&rsquo;s popularity suggests a potentially broad impact across various sectors using WordPress for their online presence.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin to a version beyond 2.1.1 to patch CVE-2026-34896.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Plugin Setting Changes via POST</code> to monitor for unauthorized changes to WordPress plugins.</li>
<li>Educate WordPress users on the risks of CSRF attacks and the importance of verifying the legitimacy of links and websites before clicking them.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>csrf</category><category>vulnerability</category></item><item><title>GitLab GraphQL CSRF Vulnerability (CVE-2026-3857)</title><link>https://feed.craftedsignal.io/briefs/2026-03-gitlab-csrf/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-gitlab-csrf/</guid><description>CVE-2026-3857 describes a vulnerability in GitLab CE/EE versions 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1, where an unauthenticated user can execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection, potentially leading to data modification or privilege escalation.</description><content:encoded>&lt;p>GitLab has addressed a critical security flaw, identified as CVE-2026-3857, within its Community Edition (CE) and Enterprise Edition (EE). This vulnerability impacts GitLab instances running versions 17.10 up to, but not including, 18.8.7, versions 18.9 up to 18.9.3, and versions 18.10 up to 18.10.1.  The core issue lies in insufficient Cross-Site Request Forgery (CSRF) protection when handling GraphQL mutations. An unauthenticated attacker could exploit this by crafting malicious web pages…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>gitlab</category><category>csrf</category><category>cve-2026-3857</category><category>graphql</category></item><item><title>engramx vulnerable to CSRF enabling graph exfiltration and prompt injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-engram-csrf-prompt-injection/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-engram-csrf-prompt-injection/</guid><description>The engramx HTTP server, enabled by default and binding to 127.0.0.1:7337, is vulnerable to CSRF and prompt injection attacks, allowing a malicious website to exfiltrate the local knowledge graph and inject persistent prompt-injection payloads.</description><content:encoded><![CDATA[<p>The <code>engramx</code> HTTP server, which is enabled by default and listens on <code>127.0.0.1:7337</code>, is vulnerable to Cross-Site Request Forgery (CSRF) and prompt injection attacks in versions prior to 2.0.2. This vulnerability stems from a combination of a wildcard CORS policy (<code>Access-Control-Allow-Origin: *</code>) and the absence of authentication by default. An attacker could exploit this by enticing a developer to visit a malicious web page, leading to the exfiltration of sensitive data from the local knowledge graph and the injection of malicious payloads. The vulnerability was discovered and responsibly disclosed by @gabiudrescu in engram issue #7. Defenders should prioritize upgrading to version 2.0.2 or implementing the provided workarounds to mitigate the risk of unauthorized access and persistent compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer installs a vulnerable version of <code>engramx</code> (&gt;= 1.0.0, &lt; 2.0.2) and the HTTP server starts by default.</li>
<li>The server binds to <code>127.0.0.1:7337</code> and serves requests without requiring authentication unless <code>ENGRAM_API_TOKEN</code> is explicitly set.</li>
<li>A developer visits a malicious website in their browser.</li>
<li>The malicious website crafts a cross-origin request to <code>127.0.0.1:7337</code> due to the <code>Access-Control-Allow-Origin: *</code> header.</li>
<li>A <code>GET</code> request to <code>/query</code> or <code>/stats</code> is sent, exfiltrating the local knowledge graph, including function names, file layout, and recorded decisions/mistakes.</li>
<li>A <code>POST</code> request to <code>/learn</code> is sent with a crafted prompt-injection payload, exploiting the lack of <code>Content-Type: application/json</code> enforcement.</li>
<li>The injected payload is written as <code>mistake</code>/<code>decision</code> nodes in the knowledge graph.</li>
<li>The user&rsquo;s AI coding agent is persistently reminded of the injected payload on every future session and file edit, leading to compromised code generation and execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the compromise of sensitive developer data, including internal function names, file layouts, and coding decisions, allowing attackers to gain insights into the target&rsquo;s projects. Furthermore, the injection of persistent prompt-injection payloads can lead to the ongoing corruption of the user&rsquo;s AI coding agent, potentially causing the generation of flawed or malicious code. While the exact number of affected users is unknown, any developer using a vulnerable version of <code>engramx</code> is susceptible to this attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>engramx@2.0.2</code> or later to apply the remediation measures outlined in the advisory.</li>
<li>If upgrading is not immediately feasible, do <strong>not</strong> run <code>engram server</code> or <code>engram ui</code> as a workaround.</li>
<li>If <code>engram server</code> must be run, set <code>ENGRAM_API_TOKEN</code> to a long random value and terminate the server before browsing the web (as noted in the advisory).</li>
<li>Deploy the Sigma rule &ldquo;Detect engramx API access without authentication&rdquo; to identify potentially unauthorized access attempts to the engramx API.</li>
<li>Monitor network connections to port 7337 on localhost, filtering for unexpected processes initiating connections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>prompt-injection</category><category>engramx</category></item></channel></rss>