Description
The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the 'publish_unpublish_popupbox' function that verifies a self-created nonce rather than one submitted in the request. This makes it possible for unauthenticated attackers to change the publish status of popups via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.
Published: 2026-01-31
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery allows an unauthenticated attacker to change popup publish status
Action: Update Plugin
AI Analysis

Impact

The Popup Box plugin for WordPress is vulnerable to Cross‑Site Request Forgery in all versions up to and including 6.1.1. A flawed nonce implementation in the function responsible for publishing and unpublishing popups verifies a self‑created value instead of the nonce supplied in the HTTP request. This omission allows an unauthenticated third party to alter the publish status of popups through a forged request. Because the change can be performed without authentication, the plugin's configuration can be modified by an attacker, potentially enabling them to inject or expose unintended content.

Affected Systems

The vulnerability affects the ays‑pro Popup Box plugin, available for WordPress sites. Versions from the initial release through 6.1.1 are impacted. The plugin was updated to 6.1.2 in September 2026 to address the flaw, so any site using 6.1.1 or earlier is at risk. All WordPress installations that rely on this plugin for countdowns, coupons, videos, or contact forms fall under the affected scope.

Risk and Exploitability

The CVSS score of 4.3 reflects low to medium severity, and the EPSS indicates a very low probability of exploitation as of the last update. The vulnerability is not listed in the CISA KEV catalog. Successful exploitation requires the attacker to convince a site administrator to load a crafted link or form, so the attack vector is social engineering combined with CSRF. If an admin is deceived, the attacker could toggle popups between published and unpublished states, potentially disrupting marketing workflows or exposing unwanted content. Overall, the risk is low to moderate, but for sites that rely heavily on popups for revenue or branding, updating the plugin mitigates the risk entirely.

Generated by OpenCVE AI on April 15, 2026 at 18:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Popup Box to version 6.1.2 or later to apply the CSRF fix.
  • Restrict administrative access by limiting the ability to publish or unpublish popups to trusted users only.
  • Monitor popup status logs for unexpected changes and review all plugin updates for similar security issues.

Generated by OpenCVE AI on April 15, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Ays-pro
Ays-pro popup Box
Wordpress
Wordpress wordpress
Vendors & Products Ays-pro
Ays-pro popup Box
Wordpress
Wordpress wordpress

Mon, 02 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 31 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
Description The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the 'publish_unpublish_popupbox' function that verifies a self-created nonce rather than one submitted in the request. This makes it possible for unauthenticated attackers to change the publish status of popups via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.
Title Popup Box <= 6.1.1 - Cross-Site Request Forgery to Popup Status Change
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Ays-pro Popup Box
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:35.031Z

Reserved: 2026-01-19T01:15:36.466Z

Link: CVE-2026-1165

cve-icon Vulnrichment

Updated: 2026-02-02T16:25:10.726Z

cve-icon NVD

Status : Deferred

Published: 2026-01-31T15:15:50.480

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1165

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:00:12Z

Weaknesses