Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jamesits
Jamesits keybase.io Verification Wordpress Wordpress wordpress |
|
| Vendors & Products |
Jamesits
Jamesits keybase.io Verification Wordpress Wordpress wordpress |
Wed, 18 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Keybase.io Verification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.5. This is due to missing nonce validation when updating plugin settings. This makes it possible for unauthenticated attackers to update the Keybase verification text via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Keybase.io Verification <= 1.4.5 - Cross-Site Request Forgery to Settings Update | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-18T12:53:01.683Z
Reserved: 2026-01-16T20:15:03.326Z
Link: CVE-2026-1072
Updated: 2026-02-18T12:25:16.548Z
Status : Awaiting Analysis
Published: 2026-02-18T06:16:33.740
Modified: 2026-02-18T17:51:53.510
Link: CVE-2026-1072
No data.
OpenCVE Enrichment
Updated: 2026-02-18T10:32:46Z