Description
The Guardian News Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's settings, including the Guardian API key, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-03-07
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated settings modification via CSRF
Action: Patch
AI Analysis

Impact

The Guardian News Feed plugin for WordPress suffers from a Cross‑Site Request Forgery vulnerability caused by the absence of nonce validation in its settings update routine. An unauthenticated attacker can trick a site administrator into performing a benign action, such as clicking a link, that triggers a forged request to the plugin’s settings endpoint. The resulting request modifies the plugin’s configuration, including the Guardian API key, without the administrator’s explicit permission. This flaw is classified as CWE-352 and permits unauthorized configuration changes that may expose sensitive credentials and allow the attacker to change the behavior of the feed integration.

Affected Systems

WordPress installations running openplatform’s "The Guardian News Feed" plugin version 1.2 or earlier are affected. All releases up to and including 1.2 lack the necessary CSRF protection, so any site using these versions is vulnerable unless the plugin is upgraded or the not‑authorized settings endpoint is disabled.

Risk and Exploitability

With a CVSS score of 4.3 the vulnerability is rated as moderate, and the EPSS score of less than 1 % indicates a low likelihood of widespread exploitation at present. The flaw is not cataloged in the CISA KEV list, reflecting its limited exploitation history. Exploitation requires user interaction: the attacker must entice an administrator to perform a pre‑determined action, such as clicking a malicious link. While the vulnerability does not grant direct access to privileged functions beyond configuration changes, tampering with the API key could facilitate further compromise by allowing the attacker to impersonate the site in requests to the Guardian data service. The overall risk thus hinges on the likelihood of a successful social‑engineering campaign against site administrators.

Generated by OpenCVE AI on April 15, 2026 at 19:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade The Guardian News Feed plugin to the latest stable release, which adds nonce validation to the settings update endpoint.
  • If an upgrade is not immediately possible, locate the file gu-open-platform-settings.php in the plugin’s directory, comment out or remove the section that writes updated settings to the database, thereby disabling the vulnerable endpoint.
  • After mitigating the CSRF risk, generate a new Guardian API key and replace the potentially compromised key in the plugin settings to prevent any credential leakage that might have occurred during an exploit.
  • Optional: implement a site‑wide CSRF protection plugin or enable WordPress built‑in CSRF safeguards and restrict administrative access to a minimum set of trusted users.

Generated by OpenCVE AI on April 15, 2026 at 19:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Openplatform
Openplatform the Guardian News Feed
Wordpress
Wordpress wordpress
Vendors & Products Openplatform
Openplatform the Guardian News Feed
Wordpress
Wordpress wordpress

Sat, 07 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
Description The Guardian News Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's settings, including the Guardian API key, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title The Guardian News Feed <= 1.2 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Openplatform The Guardian News Feed
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:30:42.779Z

Reserved: 2026-01-16T20:48:38.649Z

Link: CVE-2026-1087

cve-icon Vulnrichment

Updated: 2026-03-09T17:31:55.456Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T08:16:09.560

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-1087

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:00:06Z

Weaknesses